IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
Image for FaceBook
Download PDFRead/Download White Paper (PDF)
 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
This pdf file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the pdf file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more capable gatekeepers to suppress nefarious individuals and their cyber armaments.

But times have changed, and it is no longer possible to fully separate the good from the bad.

With the rise of enterprise mobility, real-time collaboration, cloud computing, and application-driven services, data is flowing in and out of corporate networks more freely than ever before.

These trends present a wealth of opportunity for employee productivity and operational efficiency, but they also provide new openings and vulnerabilities for malware and other threats which have become more pervasive and sophisticated. The barrier to entry for malicious actors has fallen, requiring far less in-depth technical knowledge to cause broad ranging harm.

At Intel IT, we accepted and embraced this reality a few years ago with our “Protect to Enable” strategy. It’s a novel approach to enterprise security, built on the implicit assumption that compromise is inevitable. Instead of attempting to shutter all vulnerabilities and thwart all attacks, it focuses on flexibility and survivability.

Balance is the key.

Read more in this PDF article by Chris Sellers
General Manager, Intel IT Information Security


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , ,
 
Posted in: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel