Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    End Users Not the Enemy When It Comes to Security

    Written by

    Jeff Burt
    Published July 25, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Derek Brink was thinking about where he would put his hope when it comes to data security.

      It wouldn’t be with end users and customers, the Aberdeen Group analyst said, and most enterprises are thinking about growing their businesses and profits and want to ensure that complex security products don’t interfere with those efforts. Where Brink is putting his hope is with the vendors, who have the financial and competitive motivation to drive innovation, and the engineers and technical capabilities to make it happen.

      And they have a broad view of what’s happening in the security segment in particular and in the industry as a whole.

      “They have the data,” Brink said.

      The analyst’s comments came at the tail end of a recent far-reaching, 90-minute discussion about security—from the importance of awareness and education among end users and the at-times overwhelming number of threats facing the industry to the desire to go on the offensive against hackers, the need to move beyond passwords and the security challenges presented by the rapidly growing numbers of connected devices that make up the Internet of things (IoT).

      More than a dozen analysts, journalists, end users and Dell officials met in a conference room in Boston this week to talk about security, part of Dell’s ongoing 1-5-10 Series of discussions that touch upon key issues within the tech industry now and a decade down the road. This was the second such meeting regarding security.

      An array of opinions and ideas were tossed around, but a thread that ran throughout the discussion was that while other actors—such as users and businesses—play key roles in combating the increasingly aggressive and sophisticated cyber-criminals who are taking aim at their data, ultimately the responsibility lies with vendors like Dell to ensure the tools are there to address the rapidly changing security challenges.

      One thing that was made clear is that users—those people who unwisely open the email attachment or click on the wrong URL—should no longer be used as the scapegoat, to be viewed as the weakest link in the chain. It’s incumbent on vendors to make security technology less complex and easier to use.

      “The user is not the enemy,” said Carrie Gates, senior distinguished engineer and chief scientist for Dell Research, adding that if users do something wrong, it can be seen as an indication that vendors have not done enough to give them the kinds of tools they can easily use. “How do we do security without looking at the users like they’re the enemy?”

      Businesses themselves are looking for help when it comes to security. The top technology concern among smaller businesses is security, and a key challenge is finding the products that would work best for them, SMB Group analyst Laurie McCabe said. Brett Hansen, executive director of end user computing software product marketing for Dell Endpoint Security, said he hears the same things from Dell customers.

      “We know it’s a priority,” Hansen said customers will tell him. “So what do we do now?”

      Dell officials said they understand that security ultimately starts with the vendors, and that they have multiple projects under way to make security easier, more intuitive and more suitable for the current IT landscape. The company over the last several years has aggressively built up its security capabilities—through acquisitions (like SecureWorks, SonicWall and Quest) and internal development—as part of its larger transition from a PC box maker to an enterprise IT solutions and services provider.

      End Users Not the Enemy When It Comes to Security

      Hansen noted that Dell tries to put as much integrated security—such as 256-bit encryption—into its PCs before they ship. And researchers at the company are looking at what they can develop for a world of mobile devices and clouds. The “old security paradigm” of protecting the data that is stored within a customer’s firewall no longer works given that data is constantly moving in and out of a company’s environment and from one mobile device to another, he said.

      “What we have to recognize is that the world is changing, and it’s changing very, very fast,” Hansen said, adding that the emphasis for security is expanding beyond securing the devices to include securing the data itself.

      Dell researchers for the past year have been working on a technology that would embed intelligence and policies into the data, enabling it to know what it is, on what device it’s sitting and who is trying to access it, and then to act accordingly. The data would be self-protected, with the security traveling with it regardless of where it is going or what device it’s on.

      Hansen told eWEEK that the technology could begin appearing within the next calendar year.

      Dell’s Gates said there are other projects that researchers are working on. One is looking into how the way a person uses his or her device can be used as an identifier. People’s type and swipe patterns on keyboards and device displays can vary from user to user, so they possibly could be used to identify users and determine access, she said.

      Analytics also will play a role, according to Don Ferguson, a Dell Senior Fellow, vice president and CTO of the Dell Software Group. Businesses can collect a lot of information about what’s happening in their environments, and analytics can help unlock what that data means, Ferguson said.

      “If analytics detect what’s unusual, because it’s unusual, it’s probably a security issue,” he said.

      Jeff Burt
      Jeff Burt
      Jeffrey Burt has been with eWEEK since 2000, covering an array of areas that includes servers, networking, PCs, processors, converged infrastructure, unified communications and the Internet of things.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×