This is an exceedingly useful article from IT Security. For the past couple of decades, security professionals and those trying to push various forms of malware have played a high stakes game of cat and mouse. Consequently, many approaches to data security have emerged, each protecting against one strain of vulnerability. This complex mosaic of solutions means that one security tool can overlap with another. One layer up are approaches -- such as network access control (NAC) -- that federate the localized products into a more comprehensive offering.
The article attempts to make some sense of this highly fragmented environment; it poses nine questions that those in charge of security should pose to vendors, integrators or other experts. The writer doesn't advocate a particular approach. Rather, he is laying out the first step in suggesting to businesses how they can find out how the various approaches available (for instance, white listing, access control programs and behavior-blocking) can be harnessed in a flexible and efficient manner. The piece describes what each does and whether one makes another unnecessary.
The story offers no answers. Its usefulness is in helping those charged with protecting organizational data -- but perhaps untrained in the niceties of security -- to start organizing their thinking.
The Internet loves talking about itself, and a lot of security information is available for beginners or to decision-making C-level executives whom IT must get on board in order to get funding. Here are four places to start:
Not everybody has to be an Internet security expert. Decision makers, however, must have a basic understanding of this confusing world. The complexity comes from a couple of basic sources. The first is simply the inherent complexity of malware and viruses themselves. The second level is that the ongoing parry and thrust of good folks and bad means that there are multiple simultaneous playing fields upon which the battle is played out. The overlap between the various security measures -- where one ends and the other begins, which are duplicative and, in cases of duplication, which is more effective -- must be understood.