Content

Open, transparent and safe?

Share

In the Participation Age, "trust" is the name of the game -- the trust that an "open" approach to security can create. How in today's increasingly networked world do you maintain the public trust, remove complexity from security AND adopt a open approach to risk? Here are three rules to follow:

Demand better protection with every IT purchase. Use your buying power to make sure security comes integrated into everything -- your servers, your OS, your storage, your application layers -- every IT component you buy.

Make security transparent to the user. The less people have to do to enable security the better. Automate security to make the investment required by the end-user less involved and intrusive.

Take a multi-tiered approach to security. You must intertwine culture, process and, of course, technology to have a successful security environment. Every employee is also a consumer and has been sensitized to the growing security problem by watching the nightly news.

Look, getting security right is hard and it's likely to get harder. But we're entering a time where "open" approaches to business and security will have big payoffs as millions use the network to transact and interact.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.