Categories: SecurityWorkspace

Endpoint Security And Intrusion Detection Remain Top Concern

Continued from page 1

“From IBM’s perspective we are cautiously moving forward, but we are also enabling a large number of folks to do this, as we really do want to enable enterprise apps on mobile devices,” said Merrill. “But this does raise issues such as what data resides on the device, and how do we control that data?

“To be fair for most enterprises data control is already well defined, but we need to ensure this control extends to these new endpoints,” he added.

The Internal Threat

That said, securing the endpoint is all very well, but surely no amount of investment and technology can counter the internal threat posed by disgruntled employees?

“I think the malicious employee can also have the same sensitive data stored on their mobile device and their conventional workstation,” replied Merrill. “I for example use Lotus Traveller which means that it much harder to get data off my mobile device because it is encrypted. But to be honest I think the threat posed by malicious staff is more the exception than the norm, as IT managers are more likely to be concerned about attacks from the outside, or staff simply losing their smartphone or laptops. And to be honest, it is far easier to lose a smartphone than a laptop.”

“What we at IBM are trying to do is define the roles of people within company, and then equate those roles with the right technologies,” said Merrill. “Whether virtual machines or mobile solutions, we are focusing on the security layer, where the platform doesn’t matter. That is the challenge, so we don’t sacrifice security across the platforms as we apply the layer.”

Cloud Approach

What about the advent of the cloud? How is that effecting businesses and enterprises, and will security worries mean they opt for a public or private cloud approach in future?

“Well more and more enterprises have approached the cloud conservatively, and that is not going to change,” said Merrill. “Organisations will always be cautious about what they put in the public versus private cloud.”

“The cloud simply means an extension of our current security architectures of external versus internal services, so that we never expose our internal services externally,” said Merrill. “External services will likely sit on a public cloud. For us public cloud services examples includes conferencing services (both public and private). We for example have a cloud that supports conferencing, both for internal IBM staff, but the same service is also used for external purposes.”

Continued on page 3

Page: 1 2 3 4

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

US Supreme Court Agrees To Hear TikTok Appeal

US Supreme Court says it will hear appeal of TikTok and parent ByteDance against ban…

2 days ago

Japanese Space Start-Up Destroys Second Rocket After Launch

Japanese start-up Space One destroys Kairos rocket for second time shortly after launch, as country…

2 days ago

CATL Aims To Massively Expand EV Battery-Swap Infrastructure

World's biggest EV battery maker CATL aims to build 1,000 battery-swap stations next year, rising…

2 days ago

Facebook ‘Restricted’ Palestinian News Content

Facebook has 'severely restricted' news content from Palestinian outlets since October 2023 amidst bias concerns,…

2 days ago

Amazon Faces Strike Action In US Ahead Of Christmas

Amazon faces strike actions at facilities across US days before Christmas as union members authorise…

2 days ago