Lippis Report 144: Cloud Web Security Shifts To Content And Context Threat Detection

March 22nd, 2010

nicklippis.jpgWith all the investment in IT security over the years, one would think that threats would have subsided; but they have only increased and largely increased with exploits and iframes (redirection on a reputable website to infect its visitors) up nearly by a factor of 2000 over the past two years. This has resulted in an increase in data theft Trojans over the same period by a factor of 6000, according to the 2009 ScanSafe Global Threat Report, enriching hackers and cybercriminals. What’s driving this exploit growth is that hackers and cybercriminals are automating successful techniques for mass website infection. In addition, hackers increasingly collaborate, sharing best practices to infect websites for personal gain. In short, IT and business leaders are not confronting individual hackers, but a community of cybercriminals working together to steal corporate data that is increasingly organized as a traditional business with suppliers, resellers and end users. And this community’s opportunities to attack individuals and corporations have only increased with the huge growth in mobile access and deep corporate reliance of web-based applications to automate business processes.

Read the rest of this entry »

Lippis Report 143: Cisco AnyConnect Is A New Mobile Security Model

March 9th, 2010

nicklippis.jpgNo matter where you look today the structure of IT is fundamentally changing. Applications are increasingly being accessed from mobile devices along with traditional laptop, desktop and even kiosk machines. SaaS has taken off and is far more prevalent than most executives realize as they are acquired by line of business and divisional budgets, leaving many IT leaders blind-sided and out of control with their relevance coming into question. As a result corporate application portfolios are shifting in their mix under IT leaders from one of total control to partial control to none. In short, IT leaders are finding that the largest application growth in their corporation is coming from outside of their traditional perimeter and with no control knobs. In essence applications and networks are becoming borderless.

Read the rest of this entry »

Cisco Launches AnyConnect Secure Mobility Solution

Listen to the Podcast

March 9th, 2010

 alan kesslerIT leaders are not comfortable with mobile computing security. And they do have a lot to be concerned about as securing a plethora of different devices accessing both corporate and SaaS applications from a vast array of locations and network access methods is a challenge. Traditional VPN methods are too cumbersome for users and don’t factor the huge growth in SaaS application use. A new model for securing remote and mobile access is needed and Cisco has delivered one. Cisco just launched AnyConnect Secure Mobility Client that offers a simple use model for mobile workers that leverages Cisco’s ASA, IronPort Web Security Appliance, ScanSafe, and SIO to wrap a corporate perimeter around its mobile workforce. Kevin Kennedy, Product Marketing Manager at Cisco Systems discusses a new approach to securing mobile computing.

Lippis Report 140: Securing Networks Without Borders

January 25th, 2010

nicklippis.jpgNo matter where you look today the structure of IT is fundamentally changing. Applications are being increasingly accessed from mobile devices along with traditional laptop, desktop and even kiosk machines. Applications are downloaded for free or a few dollars on mobile devices, while cloud computing and anything as a service offers a new approach to application delivery. As a result corporate application portfolios are shifting in their mix under IT leaders from one of total control to partial to none. In short, IT leaders are finding that the largest application growth in their corporation is coming from outside of their traditional perimeter and with no control knobs. In essence applications and networks are becoming borderless.

While borderless networks offer productivity improvements allowing work to follow individuals, IT leaders are concerned about its security implications, that being how do I secure corporate assets when applications are being accessed and used within and outside of corporate perimeters? Can IT leaders deliver the ease of use afforded by borderless networks securely? In this Lippis Report Research Note we offer an approach to securing networks without borders.

Read the rest of this entry »

Securing Networks Without Borders

Listen to the Podcast

January 25th, 2010

fred kost exec photo.jpgHow we do IT is fundamentally changing. Applications are increasingly being accessed from mobile devices while cloud computing offers a new approach to application delivery. Case in point, the iPhone adoption rate is 8 times faster than AOL was! As a result corporate application portfolios are shifting in their mix of total IT manager control to partial control to none. IT leaders are finding that the largest application growth in their corporation is coming from outside of their traditional perimeter/firewall with no control knobs. In essence applications and networks are becoming borderless and as a result a new flexible security model is needed to reestablish boundaries. To address this industry concern, I talk with Fred Kost, Director Security Solutions for Cisco Systems about a new approach to securing networks without borders.