IT Business Review: Striking a balance between protection and enablement

Image for FaceBook
Download PDFRead/Download White Paper (PDF)
For more information on Intel IT best practices, please visit  

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more capable gatekeepers to suppress nefarious individuals and their cyber armaments.

But times have changed, and it is no longer possible to fully separate the good from the bad.

With the rise of enterprise mobility, real-time collaboration, cloud computing, and application-driven services, data is flowing in and out of corporate networks more freely than ever before.

These trends present a wealth of opportunity for employee productivity and operational efficiency, but they also provide new openings and vulnerabilities for malware and other threats which have become more pervasive and sophisticated. The barrier to entry for malicious actors has fallen, requiring far less in-depth technical knowledge to cause broad ranging harm.

At Intel IT, we accepted and embraced this reality a few years ago with our “Protect to Enable” strategy. It’s a novel approach to enterprise security, built on the implicit assumption that compromise is inevitable. Instead of attempting to shutter all vulnerabilities and thwart all attacks, it focuses on flexibility and survivability.

Balance is the key.

Read more in this PDF article by Chris Sellers
General Manager, Intel IT Information Security