05.02.2013 Views

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

This is not unlike other business operation,<br />

such as offshore software development or<br />

outsourced product fulfillment, w<strong>here</strong> longstanding<br />

benefits of such initiatives are not realized<br />

without oversight and monitoring<br />

authority.<br />

As such, budget debates must focus not just<br />

on what legacy systems to keep and what kind<br />

of security equipment to implement, but also<br />

on the individuals and resources needed to<br />

set overarching policies and management<br />

procedures; the absence of which will mean<br />

that all the money spent keeping up with the<br />

latest tools and systems will be fruitless.<br />

While security tools will also be essential to<br />

keep networks running optimally while protect-<br />

ing sensitive and confidential corporate data,<br />

such systems should not be procured and installed<br />

at the expense of getting the right person<br />

with the right equipment in place to monitor<br />

and respond to evolving <strong>issue</strong>s in accordance<br />

with a well established corporate IT policy.<br />

Companies that successfully thwart a cyber<br />

attack will possess a well integrated combination<br />

of the right tools with the right decision<br />

makers. No single algorithm or detection system<br />

will be enough, if staff members are not<br />

provided the training and tools to do their job.<br />

Make no mistake – people have and always<br />

will matter if organizations are to maintain a<br />

robust security posture.<br />

Max Huang is the Founder and President of O2<strong>Security</strong> (www.o2security.com), a manufacturer of highperformance<br />

network security appliances for small- to medium-businesses as well as remote/branch offices,<br />

large enterprises and service providers. Max can be reached at max.huang@o2security.com.<br />

www.insecuremag.com 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!