Security is no longer an IT issue

12:19 PM
Security is no longer an IT issue -

If you Synergy keynote saw last week my portion of the day 2, you know that security is a major concern for CEOs. Some people are surprised when I say that, because you think traditionally behind a safety strategies of the company of CIOs and CSOs as the main driver. And they are usually - but the reality is that the security is no longer an IT problem, it's a business problem. The challenge is that all companies that have to do with it, different and there is no silver bullet to solve security problems. Data security has become an important part of risk management in a modern company.

Yesterday's security plan is not strong enough

Today's threat vectors are challenging and yesterday's security plan to protect your organization is not strong enough. We can not, as planned, and if we could be at risk - but we can plan how to handle it. A holistic approach, the processes to deter such includes uncover, to react and to rehabilitate (DDRR) helps us prepare, if the protection fails. A modern security plan should secure not only as systems, but it should provide a clear approach to data protection for data in use, are in transit and at rest. Monitoring users and data behavior, access control and encryption also help to raise the visibility and improve safety. A comprehensive approach should include clear governance (all the way at the board level), Architecture (IT and Business), appropriate technology and effective organization / operation.

But where to start? Our customers understand that Citrix is ​​an important partner in their current and future security strategies. There are many practical examples that we have seen some in this year's Innovation Award Video, but no supplier can be a one-stop shop for security in today's world. Our goal is to continue to make value-added products that address directly to our customers security concerns surrounding the delivery of the software-defined workspace. And just as with all our products, we believe that you can have security without compromising productivity -. Companies must ensure that they experience, reliability and flexibility provide

So how do we do that? Our main products are developed with the concept of adaptive security front and center to allow the balance of safety with activation. Virtualization, containerisation and secured networks are all critical and work together to provide an adaptive security solution available. It is about the combination of the right tools at the right time to protect what matters.

The Castle and Moat vs Metropolitan City

the sheer growth in the number of connected users, equipment, machinery and data reinforces the need for the right solutions. I like a "castle and compared to the city moat" to use analogy. Basically used companies to be able to approach a as easy as to use a moat to protect against data theft. But now, not the company are most important, companies need to see themselves as a large city. originated with the constant influx of new devices and wearables, and the rise of the Internet of Things, a new generation of security threats and challenges. Simply saying "No" to the new demands of an enlightened user base will not work. Period. The more IT says "no", they drive more employees to take things "Underground", where there is less transparency and control. The old threats, taking care of were still taken with the moat exist, of course, but you can not fix the problems of tomorrow with the thinking and methods of yesterday. You have to stay ahead of the curve and be an enabler.

Staying Ahead of the Curve

to stay ahead of the curve An example is the beta Octoblu platform we demoed in the keynote last week. I may be biased because I start helped the company to (now part of Citrix), but it is an important step to the idea of ​​how the devices and data to secure, which brings together the IoT. With Octoblu, each "thing" is considered to be identified and managed its own perimeter, with strongly keyed encryption and a separate authentication and authorization components. As a result, it is possible to white or blacklist any thing with other things from the communication as required. So not only allow new approaches to security to cope with modern challenges, but it brings the power of the Internet of Things to workspaces and business environment in order to allow more flexibility, helping people be more productive and gives them a delightful experience.

I'd love to hear your thoughts on my keynote message (and the Octoblu Demo). It is on call here. Look purely and then leave a comment or ping me on Twitter at @geirheads.

Previous
Next Post »
0 Komentar