Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    How Trust and Security in the Enterprise Have Evolved in 40 Years

    By
    Chris Preimesberger
    -
    July 26, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How Trust and Security in the Enterprise Have Evolved in 40 Years

      How Trust and Security in the Enterprise Have Evolved in 40 Years

      As new technologies and movements have been introduced, security in the enterprise has changed—and that will continue into the future.

      2The Dark Ages of Security

      The Dark Ages of Security

      Even before computers, enterprises had assets to protect, some of them intangible such as intellectual property. Security and controls often evolved from the financial side of the business, and many of those controls are still relevant today. These include, for example, physical security measures, careful personnel vetting and dual control for highly valuable assets.

      3The Dawn of the Mainframe

      The Dawn of the Mainframe

      Early business computer systems ran batch jobs, typically on mainframe computers. All the computing assets were usually together in a single place—generally a “computer room” before we started calling them “data centers.” Largely, the same types of controls were still applicable: secure the people, the room and the physical objects going in and out (tapes, card decks, printouts).

      4The Introduction of the Perimeter

      The Introduction of the Perimeter

      Time-sharing came along and, later, client/server computing. Users no longer had to be in the computer room; the systems could be accessed from anywhere. Perimeter security was introduced with protocols such as RADIUS combined with traditional data center controls; encryption was used to protect data for things such as payment card PINs and communication lines.

      5The Internet Creates New Vulnerabilities

      The Internet Creates New Vulnerabilities

      The Internet arrived in 1994, and with it perimeter security came into its own. Firewalls provided the network equivalent of the guard at the data center door, virtual private networks (VPNs) allowed the data center to be virtually extended, and Secure Sockets Layer (SSL) was created to provide a standard for secure communication and a universal trust model. Additionally, online access became increasingly important as a channel for securing and conducting business, not just internal employee access. But new attacks and weaknesses emerged as well. All those endpoints became new attack points.

      6Security Follows the Cloud

      Security Follows the Cloud

      Cloud computing emerged, and with it assets moved out of physical control of enterprise IT and into data centers, where they were mixed with those of competitors. Security of those assets depended on the cloud vendors. Identity became key to security and an attack point, through identity theft. Weaknesses were aggravated by the rise of consumer Internet usage (especially social media), enabling sophisticated attacks such as spear-phishing. As a result, ID federation was developed as a way to help manage large numbers of identities for users and to establish identity trust models between systems.

      7BYOD Exposes Mobile Security Challenges for Business

      BYOD Exposes Mobile Security Challenges for Business

      Mobile phones evolved into smartphones, used for more than calls and texts. This resulted in an explosive burst in the number and types of endpoints. “Bring your own device” (BYOD) complicated the problem of securing these devices for enterprise IT (by increasing complexity while reducing control), and WiFi and cellular networks introduced new attack vectors. Encryption and identity became more important than ever, as well as improvements in mobile device security.

      8Security Evolves Along With New Application Architectures

      Security Evolves Along With New Application Architectures

      Application architectures evolved as virtualization developed. Virtual machines allowed for better utilization, isolation and management of server resources. Now containerization and microservices are a new approach for development, especially under continuous integration/continuous deployment. The application itself might be distributed, using smaller units of computing that can run anywhere and have a limited lifetime. As a result, security needs to evolve as well to focus on the workload, not just the infrastructure and people.

      9Introducing the Internet of Trusted Things

      Introducing the Internet of Trusted Things

      What’s next? The Internet of things (IoT) will cause another exponential leap in the number of networked devices, while adding new complications and threats. Application development will continue to move toward smaller, more ethereal units with event-driven computing. Massive scale in computing power and data storage will become routinely available, introducing both new threats as well as tools to help fight them. The race will continue, with the defenders continuously raising the bar as the attackers find new ways to jump higher.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.