Endpoint management critical

September 2008 Integrated Solutions, Financial (Industry)

Although there are defined terminals and a better controlled IT landscape in most branch banking environments, the broader financial sector is definitely still at risk.

Most computer users today can be classified as a mobile workforce. Moving data around is not defined by if you have a notebook or a desktop – both contain corporate information and can be accessed with similar devices to copy or move data. Increased agility and productivity of today’s mobile workforce requires moving data and access outside of the enterprise to the endpoint, resulting in increased risk of lost or stolen data and equipment. Securing the end point by using Novell’s End Point Security Management’s location-aware security policies allows for data protection, user productivity and regularity compliance.

While perimeter security measures for the enterprise are required, they are found wanting to address all the risks for today’s mobile computing environment. Protecting the end point from emerging threats involves the management of removable media, wireless access and application control while providing 24/7 integrity of the endpoint not just when accessing the corporate network, but outside of the office as well.

Often overlooked in this process of protecting the information and the endpoint is the user. Generally speaking we place too much emphasis on the device and not enough on the people or profile accessing the device or information. The user’s identity must be managed according to the associated business policy.

If a person physically needs to be at the corporate building to work on more sensitive applications, then such a person should not be allowed to remotely access the corporate network for these specific applications. Some applications can only be activated once a user physically enters into the building, be it via proximity access or biometrics. This emphasises the use of location-aware security policies and the integration of physical, logical and identity-based access controls. Novell’s End Point Security Management, Identity Management and Access Management solutions assist corporates to overcome these challenges.

Ensuring that the risks are further reduced and compliance can be proven, especially in the financial sector, there must be an integrated monitoring, alerting and compliance reporting platform. To really know what is happening in a complex IT environment is worth gold, but more important is to be able to pro-actively react on unauthorised events. Sentinel from Novell provides the overall monitoring, alerting and reporting and based on the application or security policy will take the specified actions to prevent the right information being accessed by the wrong people.

Lewis Taljaard, business unit sales specialist at Novell SA
Lewis Taljaard, business unit sales specialist at Novell SA

For more information contact Lewis Taljaard, Novell SA, +27 (0)11 322 8334, ltaljaard@novell.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

Read more...
The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

Read more...
The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Read more...
Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
The safe city and its need for interoperability
November 2019 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices and cameras.

Read more...
Analytics-driven solutions for smart infrastructure
November 2019, Bosch Building Technologies , Integrated Solutions
Video analytics technology can bring intelligence to infrastructure by delivering solutions for traffic flow, improved safety, smart parking, and data collection.

Read more...
A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Read more...