18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Internet Security 291<br />

own eyes — it is the staff and insiders (see Figure 10.1). Electronic<br />

sabotage, theft and disclosure of proprietary knowledge by insiders are<br />

growing at an overall rate of a whopping 41% per annum.<br />

10.4. E-Security Strategy<br />

E-security strategy should be an integral part of a company's overall<br />

<strong>B2B</strong>i strategy. If a company wants <strong>to</strong> participate in <strong>B2B</strong>i, it will have <strong>to</strong><br />

forgo the old strategy of completely hiding the data if it cannot be<br />

protected. The new strategy calls for the implementation of a security<br />

solution that enables enterprises <strong>to</strong> deliver secure e-business solutions and<br />

personalized access management by controlling access <strong>to</strong> applications,<br />

resources and data. It should give them the ability <strong>to</strong> extend their<br />

internal systems <strong>to</strong> their business partners without quickly and easily<br />

compromising on security or performance; incorporate the right selection,<br />

configuration and use of security products and their integration with<br />

legacy systems; and establish dynamic security policies. As a part of<br />

their e-security strategy, companies have <strong>to</strong>:<br />

• Determine critical assets such as corporate networks, devices,<br />

applications and data;<br />

• Evaluate the potential security threats in the <strong>B2B</strong> environment;<br />

• Secure the assets by properly selecting and deploying a right security<br />

solution, which provides a high return on investment while scaling <strong>to</strong><br />

their security needs; and<br />

• Evolve the security solution by constantly reviewing the business<br />

environment, <strong>B2B</strong>i goals, current threats and the latest technological<br />

changes.<br />

10.5. Basic Security Services in <strong>B2B</strong>i<br />

E-security, in light of <strong>B2B</strong>i, is about protecting an enterprise, while<br />

extending the business information and data <strong>to</strong> cross-enterprise<br />

applications and systems. In <strong>B2B</strong>i, the focus is on building trusted<br />

relationships with trading partners, and the importance of maintaining<br />

this trust cannot be over-emphasized. Whenever data communication

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!