Data center virtualization, cloud computing, the growth of mobile applications and social computing are just some of the hot topics at the 2009 RSA Conference Europe that is currently under way in London - and they are redefining the way information security is applied.
To embrace them and seize the opportunity to build better security into the information infrastructure, RSA proposes Seven Guiding Principles encompassing the critical elements required to build an effective information security strategy within today's evolving security landscape - and this are the principles that they themselves apply:
1. Security must be embedded into the IT Infrastructure -- Security should not just be integrated within the infrastructure, it should be embedded within it. Teams from RSA and Cisco have joined forces to embed data loss prevention into devices such as the Cisco IronPort email security gateway. RSA and VMware have also engaged in a technology partnership to embed core security controls into the virtual infrastructure.
2. Develop ecosystems of solutions -- Ecosystems must be formed to enable products and services from multiple organizations to work together to solve common security problems. RSA has invested in the RSA eFraudNetwork community, an ecosystem created in collaboration with thousands of financial institutions across the globe to spot fraud as it migrates between and among financial institutions on a worldwide scale.
3. Create seamless, transparent security -- Making security largely transparent to users and systems that it is designed to protect is critical to bridging the gap between the rate of technological advancement and the ability people have to keep up with it. RSA and First Data recently announced a service designed to secure payment card data from merchants by eliminating the need for merchants to store credit card data within IT systems. This service is being built into First Data's payment possessing system, making it seamless and transparent to merchants and their customers.
4. Ensure security controls are correlated and content aware -- In the EMC Critical Incident Response Center, security information management is centralized so it can correlate data from information controls such as data loss prevention, identity controls like risk-based authentication, and infrastructure controls such as patch, configuration and vulnerability management systems. This approach to security operations is designed to accelerate how quickly security analysts can get the intelligence required to distinguish a benign security event from something more threatening to the business.
5. Security must be both outside-in and inside-out focused -- RSA argues security must include a two-pronged approach that protects both the perimeter (the outside-in) and the information itself (inside-out). Since users are accessing information from a variety of devices inside and outside the network as well as in the cloud, security policy and controls must adhere to information as it moves throughout the information infrastructure.
6. Security has to be dynamic and risk-based -- Organizations need to be positioned to dynamically correlate information from a number of sources and respond to real-time risks related to both infrastructure and information. RSA will announce this week that it is offering new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT compliance programs.
7. Effective security needs to be self-learning -- The dynamic nature of IT infrastructures and the malicious attacks launched against them is outpacing the ability of human beings to keep up with their speed and complexity. For this reason, information security strategy must be dynamic and behavior-based. To help support this goal, RSA today also announced it is teaming up with Trend Micro to leverage real-time intelligence of spyware, viruses, spam and other data generated by their Trend Micro's Threat Resource centers.
Blog Archive
-
▼
2010
(412)
-
▼
January
(173)
- Katrina Kaif to sport a bikini for ‘Dostana 2′
- Bollywood shines at Shreyas Talpade birthday bash
- Bollywood stars in ‘Phir Mile Sur’
- Preity Zinta gets stuck in the toilet at airport
- Abhi-Ash at Boman Irani’s 25 wedding anniversary bash
- Rakhi Sawant threatens Censor Board with a ‘Bhookh...
- I can never wear a bikini: Zarine Khan
- Kangana Ranaut has reasons to celebrate
- Aamir Khan & A R Rahman chosen for Padma Bhushan
- Bollywood Actress Priyanka Chopra bags the best ac...
- Vindu Dara Singh’s wife sizzles in bikini for Clou...
- Bollywood Actor Aamir Khan signs a 35 crore endors...
- Bollywood Actress Anushka Sharma locks lips with S...
- Shilpa Shetty and Preity Zinta for IPL auctions
- 10 Top Actresses who ruled the Bollywood
- Neha Dhupia goes topless to save environment
- Deepika Padukone unveils Kingfisher Swimsuit 2010 ...
- More from Dabboo Ratnani 2010 calendar
- The 16th annual Nokia Star Screen Awards
- Malaika Arora Khan to shake legs with brother-in-l...
- Celina Jaitley takes another step to support trans...
- Shriya Saran sizzles on two magazine covers for Ja...
- Sonam Kapoor at ‘Anant’ jewellery event
- Meet Zarine Khan - Salman’s new discovery
- Max Stardust Awards 2010
- Saidah Jules meets with a toe injury
- Anil Kapoor makes his debut on American television
- Bollywood stars at Louis Vuitton store launch
- Salman Khan at the racecourse to promote ‘Veer’
- Amitabh Bachchan to play bingo with his son Abhishek
- Shahid smooches Anushka thrice
- Tamil actress in tamil movie song photo
- Simran hot mallu actress photo
- Bollywood Actress Tabu in Party
- Namitha video photo
- Tamil Girl Make up
- hot kareena gallery
- hot gallery Lakshana
- Lakshana hot gallery
- tamil mallu actress
- desi actress hot Tamil
- desi actress hot mallu
- Meera Vasudev hot pics
- Can't update your Pixi to 1.3.1? 1xRTT might be to...
- DROID Gets Amish Autofocus Fix [UPDATED]
- Nokia Finally Releases N900, ‘Tis Exciting But A B...
- Vodafone 360 and the Samsung H1: It’s not all bad ...
- Xperia X10 Launching February 10th
- Palm Pixi Available Now via Sprint [Palm Pixi WebO...
- Nokia 5330 Mobile TV Edition launched
- 7 guiding principles for redefining information se...
- Samsung Galaxy Lite/Samsung Spica
- HTC Dragon
- Samsung Bigfoot
- Philips V808
- Motorola Calgary
- Sony Ericsson Xperia X3
- HTC Lancaster
- LG Etna
- Lenovo O1
- Dell mini i3
- desi actress hot Tamil
- Hot Mallika Sherawat
- Tamil actress dancing hot photo
- Most Beautiful tamil actress
- Hot Tamil actress reena
- hot tamil actress photo gallery
- sheela hot pics
- Simran Hot Pics
- hot tamil actress photo album
- Rahman Rohini hot
- Rambha hot pics
- pallavi hot pics
- hot malaika arora
- Tamil actress picture
- tamil actress hot pics
- Hot Tamil new actress
- Trisha Hot Photo
- hot bipasha
- hot mallu actreses
- Ash hot pics
- vijay is hot
- anushka hot picture gallery
- hot picture photo
- anushka hot picture
- tamil actress hot picture
- New image of Meera Jasmine
- Kareena Kapoor Mother photo
- old actress
- Bhavya Hot picture
- Hot tamil actress meena
- Hot Namitha Gallery
- hot tamil actress photo
- Tamil Actress dancing photo
- Mallu Actress Sumalatha Hot Gallery
- Chimbu mallu actress movie
- Telugu Hot Actress
- Cute Dhanam Mallu aunty
- Mumaith khan dance photo gallery
- Roma Ansari Cute mallu model
-
▼
January
(173)
»
7 guiding principles for redefining information security
» 7 guiding principles for redefining information security
Silahkan Tulis Komentar Anda ...