Network chiefs perform security balancing act

Feature

Network chiefs perform security balancing act

Network managers are facing the challenge of opening up their networks to enable new business applications while simultaneously locking down security, according to a survey of 270 senior business managers conducted by the Economist Intelligence Unit.

The survey, commissioned by AT&T, identified one of the challenges facing business as providing the right level of security: 64% of senior executives surveyed had a business goal to store detailed customer data in order to improve customer trend analysis, but 83% admitted that achieving this goal posed a security risk.

Providing online access to financial and operational data was considered a business goal by 58% of those questioned. But 85% of respondents agreed that putting such information online would pose a security risk.

Gerhard Eschelbeck, chief technical officer at security service provider Qualys, said, "The software development process has previously been driven by adding features rather than improving security."

While such features can provide a business with a new way to communicate with its customers, suppliers and partners, Eschelbeck said it also posed a potential security risk.

Locking down security, which could be achieved by deploying tightly-controlled firewall and router configurations, would reduce the risk of an external attack but could prove too restrictive for business.

The same is true of internal access, where a network access policy that is too closed could have an adverse effect on business productivity.

Robert Coles, partner and service leader at accounting firm KPMG, said, "The goal is to allow organisations to communicate more effectively and safely with the public and partners."


Business goals versus security

64% of senior executives want the business to store customer data; 83% admit this is a security risk

58% want to provide online access; 85% say this is a risk.

Source: Economist Intelligence Unit

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in October 2003

 

COMMENTS powered by Disqus  //  Commenting policy