18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.8. <strong>B2B</strong>i and E-Security<br />

Internet Security 311<br />

After discussing the fundamentals of e-security, let's review how it<br />

plays a role in a company's <strong>B2B</strong>i plans.<br />

10.8.1. Revamp your security<br />

The security solutions that companies implemented in the EDI world<br />

are rather obsolete. EDI-based communication occurs over VAN and<br />

with a select few predetermined partners. <strong>B2B</strong>i over the Internet changes<br />

all equations and makes the existing security solutions outdated.<br />

E-security for <strong>B2B</strong>i is much more than just installing a corporate<br />

firewall. <strong>B2B</strong>i requires securing communications (99.99% security level<br />

is not good enough — it has <strong>to</strong> be 100% secured) between networks,<br />

systems, applications and users across the Internet, Intranets and extranets.<br />

Below are just a few of the features that a company should look for in<br />

a security solution that would help it achieve the elusive 100% security<br />

protection:<br />

• Be a truly all-in-one security system that combines firewall, antivirus,<br />

intrusion detection and other security necessities in<strong>to</strong> a single<br />

product that's easier <strong>to</strong> manage than integrated multiple <strong>to</strong>ols;<br />

• Provides real-time transaction auditing and moni<strong>to</strong>ring of audit trails;<br />

• Provides full, cus<strong>to</strong>mized access <strong>to</strong> security information reports,<br />

policies and logs;<br />

• Interface <strong>to</strong> add, modify and delete security policy change requests;<br />

• Support for multiple operating systems such as NT and UNIX;<br />

• Provides easy-<strong>to</strong>-use graphical user interface that allows the security<br />

administra<strong>to</strong>rs <strong>to</strong> review and set entitlements as required, right down<br />

<strong>to</strong> the application and object level;<br />

• Provides a flexible and expandable security architecture, which can<br />

fit in<strong>to</strong> any company's existing infrastructure;<br />

• Offers robust access control, cryp<strong>to</strong>graphy-based privacy and authentication<br />

of users; and<br />

• Gives high performance and scalability when the load (i.e., system<br />

load, user accesses and user authentications) is great.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!