The best policy: Security first

14.12.2006
Computer security issues both offline and online continue to plague enterprises and SMEs across Hong Kong, across Asia, across the world. Whether it's simply shoveling the daily dose of spam emails out of your inbox, or combating a concerted DDOS (distributed denial-of-service) attack on your website by a competitor using a network of "zombie" computers, security issues dominate the IT landscape.

The potential damage to a company is so great that security best practices must be examined and a policy devised. How have enterprises attempted to establish consistent security frameworks and policies?

Key trends in 2006

"Enterprises/customers demand less complexity in security management and more value per unit price," said Arun Chandrasekaran, senior research analyst, ICT Practice, Frost & Sullivan Asia Pacific. "The expansion of corporate networks and increasing employee mobility has also created the need to secure multiple touch-points."

"Security risk management through a multivendor 'layered security' approach has been gaining ground in large enterprises," said Chandrasekaran. "Compliance guidelines, both [external] and internal, have begun to have a major impact on organizational security posture/framework and procurement decisions. Integrated security appliances and product suites continued to gain excellent adoption among SMBs in 2006."

Dixon Ho, CSO, Microsoft HK cited data privacy as a key driver: "With information becoming more and more valuable, there is a need for more comprehensive security controls for end-to-end protection of data," he said. "To increase the efficiency of data protection, we should combine security technologies, such as rights management or full drive encryption, and data protection policies to make sure that the data is well handled throughout the process from the moment it is created, to how it is consumed and in the end, destroyed."