On the Symantec Vision 2011 conference here Friday, said Enrique Salem, president and CEO of security vendor of this journey of transformation of the importance of cloud computing, mobility and virtualization in IT.
“IT Trends in mobile and cloud computing are driving increased connectivity in an unprecedented scale.
“These compounds are to create more opportunities and the danger points more for our intellectual property, financial integrity, corporate reputation, control of our individual and collective identity, privacy, and even national infrastructure “said Salem.
He noted that cloud computing, such as utility computing is not a “fad” and is the biggest change to reflect in IT. As the cloud platform increasingly used for storage management, backup recovery, user verification, monitoring and compliance in use, it is defined the way people think IT organizations , he added.
However, organizations are reluctant to the cloud because of security on the road, he said, referring to the state in 2011 Symantec survey cloud Asia-Pacific security organizations have been revealed in the cloud in a conflict. While 84 percent believed that the transition to the cloud would have no effect, but would help improve safety, security in cloud environments is a major concern of these organizations.
The consumerization of IT security continues to work increasingly as consumers bring their own equipment for the workplace, said Salem, adding that it becomes a more and more pressure to find new devices, and this requirement “will not slow down.”
During a debate, Art Gilliland, senior vice president of Symantec Security Information Group, also noted that the mobility and cloud cover could both productivity gains and tension for DSI before.
“Cloud and down these mobile devices and we can not hold so long, we should be putting his arms around them and begin to implement the controls, if we can,” said Gilliland.
He advised organizations to focus control information to see what data in the unit, focusing on control and make sure they know who is accessing the device.
Protect people and infrastructure
Gilliland also warned that the skills opponent security specialist for information and to generate profits from the black market, ie including its objectives, the ability to access and create a map, control of assets from theft and to have the destruction of an asset.
He added that supporters are in the black market for hackers, government-funded national states, insider threats, cyber-criminals and hacktivists. Companies must protect themselves against these opponents and a strong infrastructure, he said.
According to Gilliland, companies need to think about two important things. First, they should consider to protect their infrastructure, to ensure that their data is backed up, and there is more transparency on stocks.
Second, companies need to know where their information is “alive” and to extra protection, he said. However, he noted that the challenges of society where they do not know where all their information and what sensitive information is left around the organization is facing.
As a starting point in the protection of their infrastructure, because people are the biggest threats to corporate security, it is important to ensure that employees understand the security landscape, advised Gilliand. He added that organizations must invest in training their employees and they are “Smart Security”.
In addition, to facilitate better communication on safety within the organization, companies need to document and understand the risks and provide for the common “rules” is shared by all employees, he said.