51CTO user interview: products of different brands should be selected for Intranet security deployment

Source: Internet
Author: User

Bkjia.com exclusive Article] Speaking of enterprise network security protection, Internet security technology is mature, such as some firewalls, vulnerability scans, and intrusion detection have been well developed. Many enterprises have emphasized the deployment of Internet security products while ignoring the threat of Intranet security. In many cases, the real threat comes from the internal, and many confidential information leaks are caused by poor internal management. With the increasing awareness of Intranet security, the demand for Intranet security products and services is getting stronger and stronger, but the current security products are unusually chaotic. This is caused by the complexity of products, technologies, and management involved in Intranet security. How should we choose? Next we will interview Li Yang, Chief Security Officer of a large foreign company. I hope this will help you with the answers to the following questions.

BKJIA:We know that Intranet security is a very complicated problem, and there are different Intranet security problems for small, medium, large enterprises or different industries. So what are the internal network security problems of your enterprise?

Li Yang:Intranet security problems mainly come from two aspects: one is the border from the outside to the inside, and the other is the border security. There are different preventive measures based on security issues of different sources. At present, we are more concerned with the security of data leakage prevention.

BKJIA:What management methods or solutions does your company use to address these Intranet security problems? What is the effect?

Li Yang:As mentioned above, there are different preventive measures based on security issues from different sources. We have also deployed some Intranet security products, such as the data leakage prevention security product just mentioned. However, there is no standard for the effect, that is, the security evaluation. Only when some security events occur can the product be reflected.

BKJIA:So in the current situation, which of the following aspects do you think there are deficiencies and you want to improve Intranet security?

Li Yang: security issues of mobile devices. Currently, mobile devices such as mobile smartphones and tablets can connect to wireless networks through 3G networks, but there is still little control over these devices. At present, it only relies on mobile device software and some security controls of operators, but the company does not have such products. The deployment of mobile security products is still under discussion.

BKJIA:Many people say that Intranet security is not only a matter of network monitoring, but also a matter of administrator. What do you think of this?

Li Yang:People use the tool. For security tool products), and the use of daily office software, because each person's quality is different, the use of these tools, security awareness is different.

For different industries, there will be different personnel management requirements and regulations ). For example, in the financial industry, the IT Governance in the financial industry is aimed at setting different security levels for different departments and classes to achieve a security goal. For example, ordinary employees have different daily work security standards, O & M personnel security standards, and management personnel security standards. If it is implemented in the regulations, it will be very meticulous, such as the security management of in-service personnel and the security management of resigned personnel.

BKJIA:With your understanding, can the technical management systems provided by some Intranet security products on the market be combined with the Intranet security systems of enterprises?

Li Yang:At the beginning, it was difficult to fully match. in the later stage, we needed to customize some targeted security modules and services from security vendors.

BKJIA:From this point of view, the previous question) What features and elements do you think Intranet security products or solutions should have? What are your suggestions for the security services provided by the vendors?

Li Yang:For general enterprises, if they have internet behavior management, sensitive information management, and Endpoint Protection to control the spread of viruses) and data leakage prevention, these four aspects can achieve a basic internal network security protection standard, and then add security modules to the special needs of different enterprises.

In addition, I hope to use security products from multiple vendors.

First, the products of every security vendor are focused on different fields, and the effects will certainly be different.

Second, if multiple security modules are provided by one vendor, although the compatibility is good, it will be relatively high in terms of price. Such packaging products have monopoly and exclusion. Therefore, I hope that our security products will be diversified.

However, there will be a compatibility problem. If we use products from different vendors, there will certainly be compatibility issues. here we need to consider from the global perspective, when selecting products, we can ask the vendors to open some products) port to see if they can provide such services. Their service attitude is also very important.

Summary

From the above interview, we can easily summarize the following points:

1. basic Intranet security management includes internet behavior management, sensitive information management, and Endpoint Protection to control the spread of viruses) and data leakage prevention. Based on Different Intranet security requirements, add the corresponding product module.

2. In the formulation of Intranet security rules and regulations, personnel management and equipment management should be taken into account.

3. When purchasing Intranet security products, we should pay attention to product diversification and openness as well as vendor services and attitudes.

4. When investing in security products, we need to consider the pre-and post-security protection needs to prevent the monopoly of the manufacturers.

Bkjia.com exclusive, not reprinted without authorization! For reprinted by the partner media, please indicate the source and source of the original article !]

Edit recommendations]

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.