InvestorsHub Logo
Followers 25
Posts 915
Boards Moderated 0
Alias Born 01/26/2004

Re: None

Tuesday, 04/19/2005 9:44:38 AM

Tuesday, April 19, 2005 9:44:38 AM

Post# of 249614
2005: The Year of Internal Security

http://www.technewsworld.com/story/42227.html
For too long now we've seen security threats have a negative impact on internal networks, and as a result, a harmful effect on employee and company productivity. And for far too long, enterprises of all sizes have neglected to focus enough resources and energy on securing these valuable internal network resources.

In 2004, a quiet revolution began. And this year, the information technology industry will see this phenomenon further evolve as organizations begin to focus on securing their internal networks with the same vigor they have applied at the perimeter.

Focused Effort
Internal security refers to a focused effort to secure resources on internal networks, or LANs. These resources can include applications, data, servers, and endpoint devices. Meta Group has observed that "only 10-20 percent of organizations with relatively mature security programs have managed to address internal security to a meaningful extent."

Internal security attacks can happen either maliciously or inadvertently. But regardless of what prompts an internal security breach, one thing is for certain: The impact of internal security issues causes negative results on an organization from both a technical and business perspective.

Why is internal security finally becoming a priority? First, there are business drivers prompting more focus on internal security. Around the globe, companies are being forced to comply with regulations that ensure the privacy of customer data and the security of intellectual property that resides on internal networks. These regulations drive an increased need for internal security.

Second, there is increased awareness about internal hacking. Organizations can no longer take a "don't look, don't tell" approach. Instead, many are now required to provide proof that they are continuously looking for internal hackers. How large has the internal hacking threat become? The CSI/FBI Computer Crime and Security Survey showed that 66 percent of organizations suffered an insider attack in 2003.

Financial Impact
At the same time, the financial impact of worm and other new types of destructive threats has increased and become more visible in the industry. Having the ability to protect against and contain worms, is perhaps the No. 1 problem driving the investment in internal security solutions. It is estimated that the Slammer worm alone resulted in more than $1billion in damage, for example.

Furthermore, as security vulnerabilities in software have become more proactively communicated by Microsoft (Nasdaq: MSFT) and other sources, the timeline from vulnerability to exploit is shrinking. The time to patch the announced security holes remains ever-present -- and just takes too long. So companies are searching for ways to protect their LAN resources during this period of susceptibility - until the holes can be filled with properly patched software.

Lastly, IT organizations have realized that endpoint devices -- whether a personal computer, PDA or other device, must be as secure on LANs as they are when connecting from outside the perimeter (such as on a VPN connection.) Once these endpoints are secure internally as well as externally, they will no longer inadvertently introduce malicious code and other security threats.

How Enterprises Will Begin To Focus
Companies of all sizes are beginning to shift their attention to the topic of internal security. They are starting to initiate change in how they protect resources on the LAN, and in turn, protect their employees' productivity. Once an organization is convinced they should invest time, money and resource on internal security their first step focuses on adding an extra layer of defense within their networks, including:

-Securing endpoints
-Implementing an additional layer of protection specifically for worm defense
-Enforcement of proper use through well articulated security policy
-Quarantine capabilities for isolating infected devices
-Segmenting LANs for threat containment
-Remediation assistance

The Revolution Has Begun
2005 is the year of internal security. A combination of business and technology drivers are triggering this revolution, including worm outbreaks, privacy regulations, reduced windows of time to react and a multitude of new types of threats. There are simple steps organizations can take to get started on protecting their internal network resources.

For the organizations who make these moves, in 2005 they will reap the benefits of having more secure and stable LANs, and in turn, a more productive workforce.

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.