Home > IT Infrastructure, Technology & Telecom > Securing the Enterprise from Core to Edge

Securing the Enterprise from Core to Edge

One of the biggest challenges to arrive on the scene, a new white paper from Alcatel-Lucent finds, is “as a direct result in the number of devices now connected to the mobile Internet is the way cyber criminals now operate.”

The Georgia Tech Information Security Center has issued a warning that “sources of cybercrime will become increasingly organized and profit-driven in the years ahead,” finding that “the new wave of cyber criminals include international conglomerates of professionally trained authors motivated by high profit.”

The enterprise security challenge can be seen from three perspectives, Alcatel-Lucent finds: Managing risk, protecting data and managing costs.

Managing risk requires enterprises to be prepared for new, more sophisticated threats that can occur anytime and from anywhere. Protecting data includes managing data flow to third parties and the Cloud, protecting mobile data and preventing internal fraud and information breaches, and controlling cost requires removing security-imposed productivity barriers.

It’s a tough balancing act: “Enterprises must adapt their security to protect both the net- work infrastructure and their end users with user-centric security delivered from within the network.”

With “user-centric security,” which the Alcatel-Lucent paper goes into detail to explain, “enterprises can also retain a level of openness. They can ensure business processes are able to function as efficiently as possible because security does not get in the way of the users.”

With user-centric security employees are surrounded with security to ensure they are protected and enabled to carry out their expected role efficiently. Business partners ensure all information and shared business processes are secured so they can be sure the risk they take in “connecting electronically” with the enterprise is minimized, and the risk of doing business with the enterprise for customers is minimized.

To make a dynamic enterprise secure, organizations “must change how they view, adopt and measure security. They must view security as a positive enabler and a dynamic, integral part of the enterprise with a focus on managing risk, protecting data and controlling cost, rather than as a static add-on.”

In the white paper, Alcatel-Lucent provides a security blueprint and introduces their suite of security products.

The blueprint provides a global, corporate-wide security infrastructure, consistent and corporate-wide application of security (voice, data, mobility), security delivered separately from endpoints and applications, an independent chain of control for security “transparent to the user” and what company officials say is “always-on and highly available security.”

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: