Has there been an increase in demand for endpoint security products?
Today, devices like smart phones, PDAs, and portable entertainment systems have
become ubiquitous in many businesses and these are extremely vunerable to
malware. Many of these sophisticated threats can evade traditional security
solutions, leaving organizations vulnerable to data theft and manipulation,
disruption of business-critical services, and damage to corporate brand and
reputation. As a result, customers are seeking a more comprehensive endpoint
solution that combines anti-virus, anti-spyware, firewall, intrusion prevention
and device and application control in a way that is more easily manageable.
Has the awareness for online security increased in Indian enterprises?
Given the changing threat landscape, the proliferation of web 2.0-style
applications, and continually shifting network perimeters, enterprises now bear
the responsibility to protect the employees, customers, and partners who connect
to their networks. The ultimate objective is to ensure that all users are
confident that their interactions with a company are secure.
| Ajay Verma Director-Channels and Alliances, Symantec India |
Businesses have to take an active role in protecting customers from these new
threats. In essence, enterprises are now accepting responsibility for devices
accessing their networks even when they're not owned or managed by them.
With the slowdown in full swing, have customers put a stop to (or delayed)
their endpoint security deployments?
Information is the life and blood of all organizations, irrespective of
their size. Hence, protecting information from inside and outside threats at
this juncture will become even more critical. To do so endpoint security is a
key element in the overall security strategy. Only then can an enterprise ensure
the confidentiality, integrity, and availability of its information.
What are some of the trends in this segment?
According to the Internet Security Threat Report (ISTR), Volume XIII by
Symantec, web is the primary conduit of attack activity, as opposed to network
attacks, and that online users can increasingly be infected simply by visiting
everyday websites.
Today, hackers are compromising legitimate websites and using them as a
distribution medium to attack home and enterprise computers. They are
particularly targeting sites that are likely to be trusted by end users, such as
social networking sites. Attackers are leveraging site-specific vulnerabilities
that can then be used as a means for launching other attacks. In 2007, there
were 11,253 site specific cross-site scripting vulnerabilities reported on the
Internet; these represent vulnerabilities in individual websites.
Attackers are constantly seeking confidential end-user information that can
be fraudulently used for financial gain and are less focused on the computer or
device containing the information. The IT threat landscape has changed
dramatically over the past few years. While yesterday's attacks were meant
simply to make headlines, today's attacks have become more sophisticated and
stealthy, targeting specific organizations to reap financial gain.
Ruth Samson
(ruths@cybermedia.co.in)
/dqweek/media/agency_attachments/JNb31gQnqJvAm0jqPxaV.png)
Follow Us