Pervasive protection is the new security paradigm

Pervasive protection is the new security paradigm

Date: Jul 28, 2014

In this, the second part of a three-part video series, Henry Svendblad, principal analyst at Nemertes Research Group Inc., explores the new IT landscape and recommends a new security paradigm. He discusses how virtualization, cloud services and mobility are changing the way IT services are delivered to the business and what enterprises must do to protect their data assets. Despite all the benefits of these new developments, there is a need to adopt a new approach to securing the enterprise.

Svendblad defines pervasive protection as a suite of enterprise security technologies and operational capabilities that provide end-to-end security, with identity-based security at the center of the paradigm. It also includes the idea of assessing the risk of new technologies and services or delivery mechanisms, with the goal of achieving security that is centrally managed -- that is, the establishment of a centralized management team that handles all controls, monitoring, analysis and mitigating problems in an enterprise network.

Check out parts one and three

Read more about the changing IT security landscape

Learn how to implement pervasive protection techniques at your company

Svendblad says it's important to have centralized policies for all applications whether they are in the cloud or on the premises. Defining the ability of users to access and change information regardless of the device or network used is critical to a centrally managed network. Without a single set of security policies governing all users, devices, locations, applications and data, you will have what Svendblad calls "unbalanced protection."

How do you find balance? Svendblad says it's a combination of policy management, forensics, security information management, intrusion protection and detection and risk management.

Svendblad finds that most IT pros understand the importance of this policy, but not a lot have actually implemented it. Watch the video to find out why most enterprises do not have a centrally managed security system and to learn why it's important that they do.

More on Network Security Best Practices and Products

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: