Americas

  • United States
sandra_gittlen
Contributing Writer

With security, simplicity isn’t best

Opinion
May 05, 20033 mins
Networking

When you’re talking about security, simplicity should not be a determining factor. There has to be a sense of sophistication to whatever you install so that corporate data is not compromised. It can’t be so easy that any numbskull can hack away at your network.

All IT managers strive for simplicity. Heck, who doesn’t want work to be less complex? Who doesn’t want a turnkey solution? Who doesn’t crave out-of-the-box gear?

But when you’re talking about security, simplicity should not be a determining factor. There has to be a sense of sophistication to whatever you install so that corporate data is not compromised. It can’t be so easy that any numbskull can hack away at your network.

And that’s the point Network World columnist and Global Test Alliance member Joel Snyder and I will hammer home during our upcoming Technology Tour: “Security: Protecting Your Enterprise and Its Assets.”

Simple would be a plan that involved merely firewalls and antivirus software. Go beyond that and you have a comprehensive strategy that envelops the core of your network. Snyder says five contributing factors will make creating this strategy possible.

First, the cost of security tools is dropping. You can put more elements into securing your network without breaking the bank. Second, performance is improving, so you’ll get more for your money. Third, the management tools that tie together all these elements are improving and becoming more interoperable. This gives you a clear view of where you need to shore up resources and where you have overprovisioned them.

Fourth is the reality that policies regarding security are not a bad thing. This is the point that is most important. A few years ago, you couldn’t get past the drawing board in most organizations trying to creating a solid security plan. There were always exceptions based on politics within corporations that blew holes in an IT group’s security strategy.

Finally, one of the biggest boons to making security a reality is the advancement of Layer 2 authentication. With 802.1X, we finally have a technique for figuring out who is trying to access a network before they get to the applications, Snyder says.

The companies joining us on the tour – Foundry Networks, HP’s ProCurve Networking group, IBM, Lancope and VeriSign – will tackle the intricacies of developing a plan. They will discuss how to build security into the gear; integrate security management with traditional network management; embed security in remote desktops and mobile laptops; use new technologies such as intrusion prevention and detection to go beyond perimeter security; and employ encryption and certificates to restrict access.

Don’t expect what you learn to be simple, but expect it to be thorough. That’s your best defense. (Register for the tour here.)