Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The cybersecurity needs of the borderless enterprise

Nicholas D. Evans | June 14, 2013
As the traditional security perimeter dissolves in a virtualised environment, organisations need a new cybersecurity framework and architecture

Implementing this new cybersecurity framework and architecture will require new thinking, new tools and new approaches for securing users, applications and data. It will likely be a hybrid of techniques such as "security by design" and "security by obscurity" — all contributing to a layered, defense-in-depth approach. Perhaps your organisation will elect to digitally hide its applications and data so they are "invisible" to everyone except trusted users. That decision will lead you to look at new tools and techniques for cloaking data, so that only trusted communities of interest can gain visibility and access — whether that's on the traditional internal network or beyond to external cloud and mobile environments.

Or perhaps your enterprise will opt for advanced techniques for establishing and maintaining trusted identities in cyberspace. In that case, you will probably look into federated identity management in complex hybrid cloud environments, context-aware authentication (particularly useful in business scenarios related to mobile and social computing) and next-generation, biometrics-based authentication systems in mission-critical applications.

But it is the cybersecurity framework and architecture that will help you see what is needed in this highly distributed and virtualised environment before you move on to what is possible.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.