2003 will likely be remembered as the year when the IT industry – and in particular its IT security strand – finally came of age.
That said, all security solutions purchased must be seen to deliver demonstrable returns on investment, not to mention a centralisation solution for many disparate environments, geographies and technologies. No small feat.
An all-embracing strategy
The need for an all-embracing IT security strategy should form the driving force behind next year's new world order.
IT budgets for 2003 will be spent on policy compliance solutions which bring about the security of corporate data and integrity. Solutions that ensure an organisation is meeting its legislative and Governmental standards. Solutions that enable a corporate organisation to transact in a secure and trusted manner because of an adherence to these mandatory policies.
More importantly, perhaps, 2003 will witness the development of centralised IT security solutions that really deliver, and provide a tangible return on investment.
The reason behind all this is actually quite simple. It's down to corporate evolution. Organisations are now realising that it's not enough to simply 'dig the moat'. They realise that enterprise perimeters are porous. Managers in the blue chip sector need to dig their moat, protect the drawbridge and then know exactly who is entering their IT domain.
Just as importantly, they must ascertain exactly what these 'visitors' will need to access while they are there, and how they'll go about their business when 'on the inside'.
The end user is King
In acknowledging that the user is King, organisations realise that they need to protect their vital resources, and the data users will want to access. The most logical and effective way to guard the 'crown jewels' is by enforcing policy compliance – and implementing proactive policy management.
Policy compliance brings three major advantages to the organisation. First, control. Second, compliance with legislation. Organisations must comply or die. Third, resource provisioning. Using the fundamental ethos of policy compliance, blue chip end user companies may effectively deliver IT resources to a multi-faceted and diverse community.
In 2003, policy compliance will form the true backbone of most organisations' IT security strategy, and will be driven from the Boardroom right down through the enterprise.
Source
SMT
Postscript
John Todd is chief executive officer and founder of SafeStone Technologies (www.safestone.com)
No comments yet