Endpoint management critical

September 2008 Integrated Solutions, Financial (Industry)

Although there are defined terminals and a better controlled IT landscape in most branch banking environments, the broader financial sector is definitely still at risk.

Most computer users today can be classified as a mobile workforce. Moving data around is not defined by if you have a notebook or a desktop – both contain corporate information and can be accessed with similar devices to copy or move data. Increased agility and productivity of today’s mobile workforce requires moving data and access outside of the enterprise to the endpoint, resulting in increased risk of lost or stolen data and equipment. Securing the end point by using Novell’s End Point Security Management’s location-aware security policies allows for data protection, user productivity and regularity compliance.

While perimeter security measures for the enterprise are required, they are found wanting to address all the risks for today’s mobile computing environment. Protecting the end point from emerging threats involves the management of removable media, wireless access and application control while providing 24/7 integrity of the endpoint not just when accessing the corporate network, but outside of the office as well.

Often overlooked in this process of protecting the information and the endpoint is the user. Generally speaking we place too much emphasis on the device and not enough on the people or profile accessing the device or information. The user’s identity must be managed according to the associated business policy.

If a person physically needs to be at the corporate building to work on more sensitive applications, then such a person should not be allowed to remotely access the corporate network for these specific applications. Some applications can only be activated once a user physically enters into the building, be it via proximity access or biometrics. This emphasises the use of location-aware security policies and the integration of physical, logical and identity-based access controls. Novell’s End Point Security Management, Identity Management and Access Management solutions assist corporates to overcome these challenges.

Ensuring that the risks are further reduced and compliance can be proven, especially in the financial sector, there must be an integrated monitoring, alerting and compliance reporting platform. To really know what is happening in a complex IT environment is worth gold, but more important is to be able to pro-actively react on unauthorised events. Sentinel from Novell provides the overall monitoring, alerting and reporting and based on the application or security policy will take the specified actions to prevent the right information being accessed by the wrong people.

Lewis Taljaard, business unit sales specialist at Novell SA
Lewis Taljaard, business unit sales specialist at Novell SA

For more information contact Lewis Taljaard, Novell SA, +27 (0)11 322 8334, ltaljaard@novell.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managing staff effectively
September 2019, dormakaba South Africa, iPulse Systems , Integrated Solutions, Access Control & Identity Management
Workforce management solutions allow organisations to track the relationship between productivity and the cost of employment, incorporating issues such as health and safety, T&A, rostering and more.

Read more...
Increase security efficiency, decrease costs
September 2019 , Security Services & Risk Management, Integrated Solutions
Trackforce offers customisable mobile and web applications to increase security operational efficiency and lower costs.

Read more...
Securing ATMs 24/7
September 2019, Hikvision South Africa , CCTV, Surveillance & Remote Monitoring, Financial (Industry)
To be effective, most ATMs need to be in public areas and open all hours, and they hold cash, making them an attractive target.

Read more...
Augmented security with drones
August 2019, Drone Guards , Editor's Choice, Integrated Solutions
Drone Guards is moving into an untapped market of using drones to secure residential estates and other high-value assets such as mines, farms and commercial properties.

Read more...
10 things to consider when shopping for a VMS
August 2019, Genetec , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Today’s video management systems (VMS) provide a wide range of tools and capabilities that help make security personnel more efficient by allowing them to focus on what really matters.

Read more...
Residential security – caveat emptor
August 2019, Stafix , Integrated Solutions, Security Services & Risk Management
When it comes to improving your property’s security, make sure you take all the options into account as you build a layered approach to keeping people safe and assets secured.

Read more...
End-to-end security solutions for residential estates
August 2019, Elvey Security Technologies , Integrated Solutions, Residential Estate (Industry), Products
While there are a multitude of security options available for residential estate body corporates, unfortunately the solutions are not always able to integrate seamlessly, resulting in a hotchpotch of disparate systems.

Read more...
Integrated residential estate surveillance
August 2019, Forbatt SA , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Residential Estate (Industry)
Integrated solutions bring the best-of-breed out of each technology to give personnel all the tools they need for access control management and security.

Read more...
From fog to foxes
August 2019, Axis Communications SA , Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What makes radar devices so valuable is the fact that they can provide a high range of accurate data while barely relying on external factors, such as weather or light.

Read more...
Communications management within your security platform
August 2019, Genetec , Integrated Solutions, Residential Estate (Industry)
In the physical security industry, communications management systems, such as intercom solutions, are becoming an integral part of developing effective and comprehensive security strategies.

Read more...