compliances , information-rights-management , security

Consderations for Securing your environment

March 13, 2010

Identify Access Points

In the electronically open organization…

Who has access to your internal network?

Employees in the office or remote, using VPNs

 Contractors, consultants, temporary workers

 Customers, suppliers, and partners via extranet

 Outsiders who have penetrated the perimeter

 Operations and resources are becoming more distributed – security must follow

 Perimeter firewalls, Network IDS systems, VPNs, & authentication are insufficient in this environment.