Protecting IT resources and user identities

With Ng Fook Seng, Asia Senior Vice-President,
Security Business Unit of digital security expert Gemalto.

The Year of the Ox started with a bump. In the first day of the Spring Festival in early 2009, corporate bellwethers in the US and Europe slashed more than 76,000 jobs from their payrolls to confront the deteriorating economic downturn. This kind of drastic contingency measures certainly will have a far-reaching impact on the operations of companies, and one the consequences is a potential increase in IT security risk.

Trimming down the size of workforces will bring considerable challenges to companies – Some redundant staff members may become disgruntled. And some companies may need to rely on temporary, contract or part-time staffers to fill in the void left by employees the company let go. This is not just a human resources issue, but also an IT security concern,” warned Ng Fook Seng, Asia Senior Vice-President, Security Business Unit of digital security expert Gemalto.

Protecting IT resources and user identities is essential for the secure enterprise. Secure remote access to networks, applications and data is necessary for mobile workers. Data protection for stored, mobile and transferred files and documents is needed for loss prevention and regulatory compliance.
With a fluid workforce, IT system administrators need to have an efficient yet highly reliable user identification mechanism to keep the company’s IT resources intact. This would also provide a safeguard for protecting enterprise network security from retaliating attacks, as it can trace the sources of information breaches that come from within the organization,
” Ng Fook Seng explained.

Dilemma of Choice
PKI & OTP
Importance of authentication