Safe and Secure Connected World to Be Created

2:24:58 PM | 3/11/2008

Symantec experts say that Vietnam’s IT market is growing very fast; however, IT risks and security are raising more and more concern. Regarding this issue, a Vietnam Business Forum reporter talked with Mr Don Ng,Field Director of Enterprise Security and Asia Pacific Product Marketing for Symantec Corporation.
 
How do you rate the need to develop a foolproof security system, especially in this era of globalization and integration?
The current environment of globalization and integration is brought dramatic changes in the Internet and our networked environments. It’s also changing the way people connect and interact.
 
Online experiences now include more social interaction and collaboration. Businesses are sharing information across their enterprise supply chains and engaging in more complex e-commerce transactions. This increased complexity results in the growth of IT risks related to performance, availability, security and compliance.
 
Endpoint security is becoming complex as more mobile devices are employed by the workforce. The threat landscape has become more financially focused, with criminals now having stronger financial motivation to coordinate global cyber attacks.
 
New technologies are creating great opportunities for businesses and consumers, but also introducing new concerns about the security, reliability and integrity of our connected experiences.
 
Computer users need protection. They are increasingly dependent on technology, while the threats against these technologies continue to increase in volume and severity. It is important that computer users find ways to make themselves less vulnerable.
 
At Symantec, we see the importance of bringing together an ecosystem of products, services, and partners that will create a safe and secure connected world. Today’s threats are no longer just to the device – they are now focused on the information and interactions themselves. It is no longer enough just to keep threats out of an organization, but it is also necessary to ensure that information stays inside the organization. 
 
Symantec’s value proposition is our ability to protect our customers’ connected experiences, and to give them confidence in their online business transactions and interactions, so they can enjoy the best of what the online world has to offer.
 
What trend do you think security products will follow, in the context of high tech and online criminals becoming more aggressive?
Security solutions deployed in enterprises need to show a greater level of integration in terms of security information sharing, correlation and centralized management.
Security software must also encompass the various access points and possible sources of data leakage to adequately protect the assets of organizations.
 
Data loss prevention is a growing concern. Organizations are seeking ways to ensure information is not accessed by unauthorized users and leaked from within the organization. Endpoint security products need to control the use of USB devices, MP3 players and other storage devices connected to the corporate network.
 
In the near future, we will also see greater security coverage as devices such as smart phones are bought into the security management framework and accorded the same care and protection currently enjoyed by traditional PCs and laptops. Capabilities to monitor communications such as email and IM in real-time to detect and block leakage of sensitive information will also emerge.
 
Finally, we will see an increasing trend of consolidation among security products in the market, in order to deliver the best solutions to customers – whether those solutions come as a result of companies building them internally, developing them with partners or acquiring them outright.   
 
What are some solutions and products provided by Symantec?
The risks of end-point data leakage will increase as more employees and mobile workers access corporate networks outside the office. To prepare companies for these changes and trends, Symantec introduced the Symantec Endpoint Protection 11.0 and Symantec Network Access Control 11.0 products. Symantec Endpoint Protection 11.0 is designed to protect corporate networks from evolving threats by integrating five best-of-breed technologies under a single management console – providing simplified and advanced protection for businesses. Symantec Network Access Control 11.0 is an optional module tightly integrated with Symantec Endpoint Protection to help customers discover and evaluate the status of endpoints, grant the appropriate network access and provide remediation capabilities to ensure security policies and standards are met.
 
Another upcoming trend is the need to take an independent and open approach to the market, delivering solutions based on industry standards. With this in mind, Symantec’s enterprise solutions are operable across any operating system, storage platform, application stack, file system or backup strategy. This is also evident in our services offerings – Symantec Global Services is vendor agnostic, supporting heterogeneous environments; while Symantec’s Managed Security Services supports more than 100 heterogeneous device types.
 
Symantec's vision for security in the enterprise - “Security 2.0” – covers how the security marketplace is changing, what it means to IT, and how we think security needs to evolve as a result. Our vision is to transform security from inhibitor to business enabler. We call this Security 2.0.

As security evolves it will become more focused on balancing risk (not eliminating it). It is about both keeping the negative things out while maintaining positive things like sensitive information or intellectual property security. Security will focus more on protecting the information and interactions, not just the systems in which that information resides. 
 
Decisions will be made based on situations and reputations (people, applications, IP addresses) versus being fixed and generic. Most importantly, security will become pervasive and embedded into business processes so they can become standardized and automated.
 
We see Security 2.0 as policy-driven, information-centric, and operationalized across a well managed infrastructure. This is the foundation for our vision, and how we will make that vision a reality through our products and services.