Endpoint management critical

September 2008 Integrated Solutions, Financial (Industry)

Although there are defined terminals and a better controlled IT landscape in most branch banking environments, the broader financial sector is definitely still at risk.

Most computer users today can be classified as a mobile workforce. Moving data around is not defined by if you have a notebook or a desktop – both contain corporate information and can be accessed with similar devices to copy or move data. Increased agility and productivity of today’s mobile workforce requires moving data and access outside of the enterprise to the endpoint, resulting in increased risk of lost or stolen data and equipment. Securing the end point by using Novell’s End Point Security Management’s location-aware security policies allows for data protection, user productivity and regularity compliance.

While perimeter security measures for the enterprise are required, they are found wanting to address all the risks for today’s mobile computing environment. Protecting the end point from emerging threats involves the management of removable media, wireless access and application control while providing 24/7 integrity of the endpoint not just when accessing the corporate network, but outside of the office as well.

Often overlooked in this process of protecting the information and the endpoint is the user. Generally speaking we place too much emphasis on the device and not enough on the people or profile accessing the device or information. The user’s identity must be managed according to the associated business policy.

If a person physically needs to be at the corporate building to work on more sensitive applications, then such a person should not be allowed to remotely access the corporate network for these specific applications. Some applications can only be activated once a user physically enters into the building, be it via proximity access or biometrics. This emphasises the use of location-aware security policies and the integration of physical, logical and identity-based access controls. Novell’s End Point Security Management, Identity Management and Access Management solutions assist corporates to overcome these challenges.

Ensuring that the risks are further reduced and compliance can be proven, especially in the financial sector, there must be an integrated monitoring, alerting and compliance reporting platform. To really know what is happening in a complex IT environment is worth gold, but more important is to be able to pro-actively react on unauthorised events. Sentinel from Novell provides the overall monitoring, alerting and reporting and based on the application or security policy will take the specified actions to prevent the right information being accessed by the wrong people.

Lewis Taljaard, business unit sales specialist at Novell SA
Lewis Taljaard, business unit sales specialist at Novell SA

For more information contact Lewis Taljaard, Novell SA, +27 (0)11 322 8334, ltaljaard@novell.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...
Improving safety and security
Gallagher Education (Industry) Access Control & Identity Management Integrated Solutions
Education facilities have more than enough to deal with when it comes to allocating budget. Security often seems to be the last item on the agenda but is more important than ever.

Read more...
Software is South Africa’s most promising business opportunity
Integrated Solutions IT infrastructure
When we talk about software as a business opportunity, we are not just talking about software or IT as a standalone product; deploying computer and network-related solutions to augment traditional processes represents an evolutionary shift in how the world works.

Read more...
Finding balance in a world of shifting supply chains
Logistics (Industry) Integrated Solutions Products
Retailers and consumer goods manufacturers need precise demand planning now more than ever. With help from the AI-powered SAS Intelligent Planning Cloud, companies can anticipate and address shopper needs and shipping disruptions more effectively.

Read more...
SA banking sector chooses enterprise-grade ID verification
Financial (Industry) Access Control & Identity Management Integrated Solutions
In terms of the secure digital onboarding of customers, South Africa’s major banks have made massive inroads by using remote facial authentication.

Read more...
The state of the biometrics market
neaMetrics Technews Publishing Suprema Hikvision South Africa IDEMIA Access Control & Identity Management Integrated Solutions
Now that the pandemic is over (hopefully), will we see the same confidence in biometrics for access and identification or will the world be reverting to touch-based systems, including cards and fobs (or mobiles).

Read more...
Suprema development tools
Suprema Access Control & Identity Management Integrated Solutions
With integrating systems from different companies a critical part of an effective security solution, Suprema highlights its development tools aimed at making integration with its products simpler.

Read more...
The future of touchless biometrics
Technews Publishing Fulcrum Biometrics Access Control & Identity Management Integrated Solutions
Facial biometrics is the main talking point today, helped along by COVID, but is it the best touchless solution available? Rob Griggs from Fulcrum Biometrics Southern Africa recommends other touchless alternatives.

Read more...
The problem with biometrics
Technews Publishing Editor's Choice Access Control & Identity Management Integrated Solutions
We have come to rely heavily on biometrics for many aspects of access and identity management, especially in identity management where selfie authentication is accepted with confidence. Are we doing it right? Roger Grimes has his own take on the matter.

Read more...
Five banking and payment security threats and trends in 2023
Cyber Security Financial (Industry)
The digital pendulum is swinging back to pre-pandemic agendas, offering security leaders in the banking world a chance to revisit longer-term projects and take advantage of the tech crunch layoffs to bolster their security teams.

Read more...