Categories: SecurityWorkspace

Endpoint Security And Intrusion Detection Remain Top Concern

Continued from page 1

“From IBM’s perspective we are cautiously moving forward, but we are also enabling a large number of folks to do this, as we really do want to enable enterprise apps on mobile devices,” said Merrill. “But this does raise issues such as what data resides on the device, and how do we control that data?

“To be fair for most enterprises data control is already well defined, but we need to ensure this control extends to these new endpoints,” he added.

The Internal Threat

That said, securing the endpoint is all very well, but surely no amount of investment and technology can counter the internal threat posed by disgruntled employees?

“I think the malicious employee can also have the same sensitive data stored on their mobile device and their conventional workstation,” replied Merrill. “I for example use Lotus Traveller which means that it much harder to get data off my mobile device because it is encrypted. But to be honest I think the threat posed by malicious staff is more the exception than the norm, as IT managers are more likely to be concerned about attacks from the outside, or staff simply losing their smartphone or laptops. And to be honest, it is far easier to lose a smartphone than a laptop.”

“What we at IBM are trying to do is define the roles of people within company, and then equate those roles with the right technologies,” said Merrill. “Whether virtual machines or mobile solutions, we are focusing on the security layer, where the platform doesn’t matter. That is the challenge, so we don’t sacrifice security across the platforms as we apply the layer.”

Cloud Approach

What about the advent of the cloud? How is that effecting businesses and enterprises, and will security worries mean they opt for a public or private cloud approach in future?

“Well more and more enterprises have approached the cloud conservatively, and that is not going to change,” said Merrill. “Organisations will always be cautious about what they put in the public versus private cloud.”

“The cloud simply means an extension of our current security architectures of external versus internal services, so that we never expose our internal services externally,” said Merrill. “External services will likely sit on a public cloud. For us public cloud services examples includes conferencing services (both public and private). We for example have a cloud that supports conferencing, both for internal IBM staff, but the same service is also used for external purposes.”

Continued on page 3

Page: 1 2 3 4

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Apple Store Workers Vote To Strike Over Contract Talks Delay

Workers at unionised Apple store in Maryland vote to authorise first ever strike, after delays…

3 days ago

Business Intelligence: Next-Generation Data Analytics

Explore how cutting-edge technologies are reshaping decision-making, driving innovation, and propelling businesses into the data-driven…

3 days ago

YouTube Blocks Hong Kong Protest Anthem After Court Order

Anthem used by protesters in Hong Kong is blocked by YouTube, as critics lash out…

3 days ago

US Investigates Alphabet’s Waymo After Self-Driving Incidents

'Unexpected behaviour' of Waymo's self-driving vehicles triggers investigation by American safety regulators

4 days ago

TikTok Creators Sue To Block US Divest Or Ban Law

Group of TikTok creators in the United States attempt to block recent law that will…

4 days ago