RSA 2009: Security technologies must be integrated

The biggest problem in information security is that organisations approach...

The biggest problem in information security is that organisations approach security in a piecemeal way with point products.

This is according to Art Coviello, president of RSA, the security division of EMC.

This means security technologies are not integrated and do not provide the best protection possible, he told Computer Weekly at RSA Conference 2009 in London.

"If the technology comes already integrated, it is much easier for organisations to implement a true security infrastructure," he said.

In the past year the industry has made progress towards integrating technologies developed by multiple suppliers, he said.

RSA has forged agreements with Microsoft and Cisco to embed RSA's data loss prevention (DLP) technology in some of their products.

The company is also integrating its technology in services such as the credit card information processing service offered by First Data. The credit card information processing service uses embedded encryption technology from RSA.

RSA is collaborating with IBM and HP on an encryption key management standard, the Key Management Interoperability Protocol (KMIP), which will allow key management to be standardised across multiple encryption applications.

"These are the kinds of things that will make it more effective for end users to implement security solutions," said Coviello.

This week, RSA announced a co-operation agreement with Trend Micro to take feeds from their anti-virus and anti-malware capability to bolster RSA's anti-Trojan service in its anti-fraud centre.

"I am proud of the fact that we were the thought leaders around this concept of an ecosystem of security providers and that people have latched on to it and said this makes sense, this is the only way to go about it," he said.

Read more about RSA 2009:

RSA 2009: Cyber fraudsters are getting smarter >>

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close