Categories: SecurityWorkspace

Endpoint Security And Intrusion Detection Remain Top Concern

Business IT managers currently face an increasing challenge of securing both their physical and virtual endpoints, whilst at the same time fending off the nightmare scenario of hackers penetrating their internal systems.

So says Dave Merrill, IBM’s Chief Information Security Officer, who spoke to eWEEK Europe UK about the critical need to secure an organisation’s endpoints and the security implications of the cloud, plus what is keeping security managers awake at night.

Today’s Threat Assessment

Merrill believes that currently endpoint security encompasses the ongoing challenge of incorporating people’s smartphones and even tablets into the corporate infrastructure, but it also includes traditional endpoints such as desktops PCs, servers, roaming laptops etc.

Another headache is posed by specialised equipment such as point-of-sale devices, ATMs, and self-service kiosks etc.

“What keep me awake at nights is the fact consistently across most enterprise organisations we are confronting two or three major ‘plays’ at the moment,” said IBM’s Merrill.

“The first concerns the threat being posed by targeted attacks, as witnessed by the recent Sony Playstation attack,” said Merrill. “We are very concerned about targeted attacks and the measures we have to take in order to prevent this, as these attacks can not only damage an organisation’s intellectual property, but also the brand reputation.”

“From IBM’s perspective this has caused us a lot of intense discussions lately, as attacks like these are very difficult to identify, kind of like finding a grain of sand at the bottom of the ocean,” said Merrill. “We are now used to botnet attacks, but the latest attacks are an order of magnitude more difficult to detect and repel.”

Endpoint Security

“The other two major concerns we have at the moment concern mobile enablement and the cloud, both of which are key transformational items for a business,” said Merrill. “These offer critical and essential benefits, so how do we enable mobile and smartphones as well as tablets, but at the same

Continued on page 2

Page: 1 2 3 4

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Elon Musk’s X Suffers Multiple Outages

Nation-state cyberattack? Elon Musk blames outages on Monday at X (formerly Twitter) on “massive cyberattack”

12 hours ago

Apple Confirms AI Improvements to Siri Delayed To 2026

More time required for Apple to improved the AI capabilities of the Siri voice assistant,…

13 hours ago

Siemens Confirms $285m Manufacturing Investment In US

German conglomerate Siemens confirms $285 million investment for manufacturing facilities in Texas and California

14 hours ago

IBM Wins Lawsuit Against LzLabs Over Mainframe Patents

Court ruling. Big Blue lawsuit filed in London had alleged IP theft of mainframe technology…

16 hours ago

Trump Says US Talking With Four Groups Over TikTok Sale

But what about Beijing? Donald Trump says administration in talks with four different groups about…

19 hours ago