Endpoint management critical

September 2008 Integrated Solutions, Financial (Industry)

Although there are defined terminals and a better controlled IT landscape in most branch banking environments, the broader financial sector is definitely still at risk.

Most computer users today can be classified as a mobile workforce. Moving data around is not defined by if you have a notebook or a desktop – both contain corporate information and can be accessed with similar devices to copy or move data. Increased agility and productivity of today’s mobile workforce requires moving data and access outside of the enterprise to the endpoint, resulting in increased risk of lost or stolen data and equipment. Securing the end point by using Novell’s End Point Security Management’s location-aware security policies allows for data protection, user productivity and regularity compliance.

While perimeter security measures for the enterprise are required, they are found wanting to address all the risks for today’s mobile computing environment. Protecting the end point from emerging threats involves the management of removable media, wireless access and application control while providing 24/7 integrity of the endpoint not just when accessing the corporate network, but outside of the office as well.

Often overlooked in this process of protecting the information and the endpoint is the user. Generally speaking we place too much emphasis on the device and not enough on the people or profile accessing the device or information. The user’s identity must be managed according to the associated business policy.

If a person physically needs to be at the corporate building to work on more sensitive applications, then such a person should not be allowed to remotely access the corporate network for these specific applications. Some applications can only be activated once a user physically enters into the building, be it via proximity access or biometrics. This emphasises the use of location-aware security policies and the integration of physical, logical and identity-based access controls. Novell’s End Point Security Management, Identity Management and Access Management solutions assist corporates to overcome these challenges.

Ensuring that the risks are further reduced and compliance can be proven, especially in the financial sector, there must be an integrated monitoring, alerting and compliance reporting platform. To really know what is happening in a complex IT environment is worth gold, but more important is to be able to pro-actively react on unauthorised events. Sentinel from Novell provides the overall monitoring, alerting and reporting and based on the application or security policy will take the specified actions to prevent the right information being accessed by the wrong people.

Lewis Taljaard, business unit sales specialist at Novell SA
Lewis Taljaard, business unit sales specialist at Novell SA

For more information contact Lewis Taljaard, Novell SA, +27 (0)11 322 8334, [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

A key to urban transport challenges
Axis Communications SA Transport (Industry) CCTV, Surveillance & Remote Monitoring Integrated Solutions Logistics (Industry)
There are many enabling technologies that can impact transportation in South Africa, but a good place to start is by considering the applications for smart physical technology with the ability to collect and respond to data.

Hikvision aims for solutions
Technews Publishing Hikvision South Africa Editor's Choice CCTV, Surveillance & Remote Monitoring News Integrated Solutions Conferences & Events
Hikvision recently held a roadshow titled Industry X, where the company highlighted its latest products and solutions, supported by partners and distributors.

Technology and the future of security installation in South Africa
Editor's Choice Integrated Solutions Security Services & Risk Management
What are the technologies and trends shaping installation, service and maintenance teams globally, and how will they shape South African businesses today and in the future?

Upgraded security and AI monitoring at upmarket estate
Watcher Surveillance Solutions Editor's Choice CCTV, Surveillance & Remote Monitoring Integrated Solutions Residential Estate (Industry)
Estate upgrades and enhances its security through a partnership between surveillance specialist Watcher and the incumbent guarding company.

Streamlining processes, integrating operations
Security Services & Risk Management Integrated Solutions Transport (Industry) Logistics (Industry)
With Trackforce Valiant, Airbus now has one single platform that connects its security guards, supervisors and management across its organisation.

Nomad launches early adopter programme
Editor's Choice News Integrated Solutions Smart Home Automation
Participants in Nomad’s Early Adopter Programme will receive 10% of their volume order to facilitate testing before the commercial launch later this year.

Improve data connectivity in fleet management
Flickswitch Transport (Industry) Integrated Solutions Products
While the market is still dominated by tracking systems, more advanced fleet management solutions are gaining traction on the market.

IoV – the cutting edge of vehicle automation
Integrated Solutions IT infrastructure Transport (Industry) Logistics (Industry)
Today’s cars have become bona fide connected machines and not merely an extension of our mobile devices such as smartphones.

Understanding what an IoT platform is
Trinity IoT Integrated Solutions
In an increasingly mobile-first, digitally driven global economy, IoT platforms are becoming commonplace. But what is an IoT platform, and what makes one better than the other?