Advertisment

Secure Your Business

author-image
CIOL Bureau
Updated On
New Update

As IT infrastructure continues to evolve and

mature with large enterprises, the need for increased IT security will become

more and more obvious. And as enterprises realize the limitations of basic

technology in guaranteeing enterprise security, they will need to adopt a

holistic approach to organizational security, taking into due consideration all

three key factors-people, processes and technologies.

Advertisment

Application security will become increasingly

important over the next few quarters. With more and more e-governance projects

using custom-built applications, there will be a need to ensure those

applications to be bug-free and virus free. Same is the case with banking

applications. As more enterprises become more vigilant, there will be a market

demand for third party certification for applications.

Changes in regulatory environment are also

expected to shape the security industry in India in a big way. As of yet, there

is no direct corporate liability for enterprise security. And apart from banking

and RBI sector, there exist no guidelines for enterprises to follow. This is

expected to change in the next 1-2 years as a new comprehensive IT legislation

is expected to be passed to ensure organizational liability in matters of

corporate security.

In terms of high-end security tools, large

enterprises will continue to adopt intrusion detection systems. Particular

thrust for the same will be seen in BFSI and manufacturing sectors, which have a

mature IT infrastructure in place. For remote access and applications like

inter-branch banking, VPNs will continue to be deployed.

Advertisment

At

the Elementary Level...


On personal desktops, more companies will

consider upgrading from Windows 95 and 98 to an OS that limits users'

rights and prevents installation of unauthorized software on desktops.

Access to removable media like CD-Rs and USB flash drives will also be

controlled at the desktop level.






Spam will only keep on increasing in volume and newer tricks like random
punctuation and sending of gif images as messages will make the job of

dealing with spam increasingly harder for IT managers. Despite a large

amount of spam filtered away at the gateway level, users will increasingly

find themselves deluged with messages.

Large companies will also begin to regulate

and rationalize Internet access to employees, taking it away from those

who do not need it for their work. Another move will be to control or

regulate access to IM services, widely popular among companies for instant

communications. Efforts will be made to regularize such use, or to set up

an internal IM service that does not use public IM servers.

Most large enterprise with multiple applications

will deploy 3A tools of security-access, authentication and

administration-upon their internal applications, for example, user

authentication for e-commerce. This will also be driven by a need to keep CRM

data separate from users of say SCM data.

Tools like anti-virus and secure content

management have so far made their ground mostly on the desktop level. They will

increasingly move at server level or gateway level in large enterprises. For

remote location security, simple plug-and-play security devices or appliances

will take over from software applications. The appliances will make things

easier for manufacturing companies with small remote locations, where provision

of even an IT manager is difficult.

Advertisment

Because of limited off take of e-commerce in

India, technologies like PKI and bio-metrics will see little traction in the

domestic market in the next two-three years. Digital signatures have found early

adopters with quite a few initiatives on pilot levels, and future uptake of the

technology will depend on successes in these pilots. For example, Director

General of Foreign Trade in India recently adopted digital signatures for

documents and notifications issued to exporters. Businesses will adopt digital

signatures only if they see cost savings and productivity enhancements. In terms

of verticals, BPO and IT sectors will be role models for other industries with

their scale and adoption of best practices in security.

tech-news