Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Blogs
    • Security Watch

    Is Anybody Watching?

    Written by

    Matthew Hines
    Published April 19, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Everybody knows that many of today’s compromised devices result from end user visits to infected Web sites or downloads of unapproved applications, however, few organizations are taking the time to carefully monitor or police people’s online hygiene.

      While many companies are beginning to look at applications white-listing technologies, and organizations in heavily-regulated industries such as financial services have tightened the clamps on larger numbers of users and begun restricting access to more sites, in particular social media applications, many companies are still not looking closely enough at this critical stream of intelligence which could help them improve their security quickly, proponents of monitoring technologies claim.

      Among those evangelizing the increased use of traffic monitoring for security purposes are a number of network management tools providers, who for the most part maintain that along with helping organizations ensure matters of uptime and performance, their technologies should be used by customers to play a larger role in driving security programs.

      One such company that will be showing off a free, browser-based traffic monitoring tool at this week’s RSA Conference 2009 is Cymphonix, which hopes that it’s Revealer, offered to organizations at no charge for a 30-day trial, will open some people’s eyes about why they might be handling so many infected endpoints.

      “Internet traffic is increasing at a rapid rate and most organizations do not have full visibility into the types of Web traffic and applications running on their respective networks. In addition, most organizations agree that employee use of inappropriate and bandwidth intensive websites can negatively impact security and productivity,” the company said in touting its capabilities. “As Internet content such as YouTube, Facebook and MySpace continues to evolve, such inappropriate use will become even more prevalent. The key to achieving control over these impending challenges lies in an organization’s ability to achieve true visibility into users, applications and threats.”

      Once companies gain an idea of where infections are coming from, they can funnel problematic users into security training programs, or simply begin shutting off access to unapproved sites, or classes of programs, the philosophy goes.

      At the SOURCE Boston 2009 conference last month, a panel of experts speaking in a session devoted to bridging the gaps between security strategists and their line of business counterparts devolved at times into debate over whether companies should begin preventing more of their workers from visiting non-work sites using their company-issued computing devices or over corporate networks.

      The group, which included both security consultants and business technology executives, specifically found itself hotly debating the prospect of social networking sites, many of which have harbored malware attacks – and the ability of organizations to retain top quality workers if they choose to become more restrictive with their usage policies.

      “It’s a challenge, because to enable collaboration we have to use collaborative tools, but my advice is that companies restrict something like social networking based on the security implications,” said Adriel Desautels, a senior partner and co-founder at security consulting specialists Netragard LLC. “To be most secure, companies need to try to lock down everything as best as they can; you can take things like chat and e-mail and other tools and keep them inside your networks, and that’s just as effective as open tools like Facebook.”

      The expert also contends that organizations face major security risks by allowing their employees to advertise their place of work on sites like MySpace and Facebook, as they create an opportunity for targeted attacks that use information or trust relationships gleaned from the Web 2.0 sites to create more believable social engineering campaigns.

      At the same time, even some leading security experts defend that users must be presented with a model that allows them more freedom than Desautels suggested.

      “Today’s workers need have to have these tools to develop and maintain closer relationships, and many companies need to employ the types of creative people who want to use these sites,” said Adam Shostack, a well-known security researcher employed by Microsoft – who challenged the consultant from the audience, noting that some top workers might not want to work for companies that tightly restrict access, especially younger professionals who have become dependent on social applications.

      “People need a security model that aligns with both sides of this challenge,” he said.

      Is anyone in your organization actively policing your web habits? Should they be?

      No matter what you think about tighter restriction of Web access, the answer would seem pretty clear.

      Matt Hines has been following the IT industry for over a decade as a reporter and blogger, and has been specifically focused on the security space since 2003, including a previous stint writing for eWeek and contributing to the Security Watch blog. Hines is currently employed as marketing communications manager at Core Security Technologies, a Boston-based maker of security testing software. The views expressed herein do not necessarily represent the views of Core Security, and neither the company, nor its products and services will be actively discussed in the blog. Please send news, research or tips to [email protected].

      Matthew Hines
      Matthew Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×