How to create inherently secure communications by ComputerWeekly.comWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
How to create inherently secure communications

> View this now

Published on: November 10, 2010
Type of content: WHITE PAPER
Format: Unknown
Length: 6 pages
Price: FREE


In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. This required that any visitors to the enterprise with electronic devices had no ability to access the network, all users were properly managed, and that they abided by enterprise rules with regard to information management and security.  This is now a rare situation. Most enterprises use computers that are connect to the Internet, employing wireless communications internally, with the majority of their users connecting to services outside the enterprise perimeter, and partners and collaborators regularly connecting to the enterprise’s internal network with their own computing devices.  Additionally there is the emergence of Targeting Trojans and Worms that rely on our use of this old “Internal Trust” architecture to propagate.  In the de-perimeterised world, the use of inherently secure communications1 is essential (JFC#42) to provide protection from the insecure data transport environment. Inherently secure communications products, services, and protocols should act as fundamental building blocks for secure distributed systems, adaptable to the needs of applications while adhering to requirements for security, compliance and performance

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts