Skip to main content

7 guiding principles for redefining information security

Data center virtualization, cloud computing, the growth of mobile applications and social computing are just some of the hot topics at the 2009 RSA Conference Europe that is currently under way in London - and they are redefining the way information security is applied.

To embrace them and seize the opportunity to build better security into the information infrastructure, RSA proposes Seven Guiding Principles encompassing the critical elements required to build an effective information security strategy within today's evolving security landscape - and this are the principles that they themselves apply:

1. Security must be embedded into the IT Infrastructure -- Security should not just be integrated within the infrastructure, it should be embedded within it. Teams from RSA and Cisco have joined forces to embed data loss prevention into devices such as the Cisco IronPort email security gateway. RSA and VMware have also engaged in a technology partnership to embed core security controls into the virtual infrastructure.

2. Develop ecosystems of solutions -- Ecosystems must be formed to enable products and services from multiple organizations to work together to solve common security problems. RSA has invested in the RSA eFraudNetwork community, an ecosystem created in collaboration with thousands of financial institutions across the globe to spot fraud as it migrates between and among financial institutions on a worldwide scale.

3. Create seamless, transparent security -- Making security largely transparent to users and systems that it is designed to protect is critical to bridging the gap between the rate of technological advancement and the ability people have to keep up with it. RSA and First Data recently announced a service designed to secure payment card data from merchants by eliminating the need for merchants to store credit card data within IT systems. This service is being built into First Data's payment possessing system, making it seamless and transparent to merchants and their customers.

4. Ensure security controls are correlated and content aware -- In the EMC Critical Incident Response Center, security information management is centralized so it can correlate data from information controls such as data loss prevention, identity controls like risk-based authentication, and infrastructure controls such as patch, configuration and vulnerability management systems. This approach to security operations is designed to accelerate how quickly security analysts can get the intelligence required to distinguish a benign security event from something more threatening to the business.

5. Security must be both outside-in and inside-out focused -- RSA argues security must include a two-pronged approach that protects both the perimeter (the outside-in) and the information itself (inside-out). Since users are accessing information from a variety of devices inside and outside the network as well as in the cloud, security policy and controls must adhere to information as it moves throughout the information infrastructure.

6. Security has to be dynamic and risk-based -- Organizations need to be positioned to dynamically correlate information from a number of sources and respond to real-time risks related to both infrastructure and information. RSA will announce this week that it is offering new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT compliance programs.

7. Effective security needs to be self-learning -- The dynamic nature of IT infrastructures and the malicious attacks launched against them is outpacing the ability of human beings to keep up with their speed and complexity. For this reason, information security strategy must be dynamic and behavior-based. To help support this goal, RSA today also announced it is teaming up with Trend Micro to leverage real-time intelligence of spyware, viruses, spam and other data generated by their Trend Micro's Threat Resource centers.

Popular posts from this blog

Neha Dhupia: I am the single!

Neha Dhupia actress Bollywood is individual, but we still do not know whether he is ready to mingle! Media notice actor clarifies the status of his connection to very quickly, said that he sees the person currently Yes squash player Ritwik Bhattacharya. Hot in a pair are reported in this Neha Dhupia and Ritwik Bhattacharya now for a long time, and gives a sudden after notification to the actor may take a lot of his fans by surprise. The couple has been very low key about their case, it was at the part-session in June of this year, Neha Dhupia month that and Ritwik Bhattacharya had been announced must be divided where they jointly with 12 years. Neha Dhupia submits, however, that he and Ritwik Bhattacharya remain very good friends. Item-bomb Bollywood, often referred to, it is his screen image that appears in some cases, by way of derogation from the provisions, so that people believe that he or she may also act. Neha Dhupia is Surprisingly, no regrets and says that he has received his/...

Shah Rukh, Shahid Priyanka to the rock and the Durban

Shahrukh khan and priyanka chopra Durban has some Bollywood taste of the real world, when the stars, such as the Shah Rukh Khan, shahid kapoor and Priyanka Chopra to groove their hit numbers Sunday to celebrate the occasion, India and South-Africa friendship for 150 years. The concert, which promises to bring together the world's cricket and entertainment around the joint, hosted by Anil Kapoor actor. This friendship concert is the initiative of AAMEDIA, a South African company, and Cricket in South Africa. It must be ordered and carried out Wizcraft international entertainment and Cineyug Productions. "Wizcraft has been very warm and relations with African, Caribbean and South Africa. IIFA awards, and the second was a weekend of Sun City in 2001 and the fourth edition of the we are the same in 2003 in Johannesburg, shaped by the correlation between the two countries, "said Director Joseph Wizcraft Sabbas Declaration. "For us to extend hospitality was touching and ...

Nandini Jumani most wanted by Bollywood.

The Krazy Kool Kat Been Bajake video released last week has stirred up demand for Nandini Jumani. With offers pouring in for a performance on New Year’s eve, Nandani found it hard to decide which one to accept. After much consideration, Nandani will be seen flaunting her curves at a venue in Hyderabad and will take home a cool Rs.25 lakh for her performance. Though this is not in the same league as the Malaika’s and the Priyanka’s, Nandani did beat them considering the sheer number of offers she received for her to perform. Nandini was born on 3rd June 1984 in Assam. She stepped into the glamour world while doing her post graduation at university of Pune. She is a university topper and wanted to become an IPS officer. She dreams to have a old age home of her own one day and currently associated with St. Anthonys home for olds in Mumbai. Nandini is trained under legendry Saroj Khan for Bollywood Dancing and have done acting workshops with renowned theatre personality Sa...