A Holistic Approach to Securing the Enterprise
by Don Kleinschnit - Vice President Of Product Delivery At Symantec’s Enterprise Administration Business Unit - Friday, 2 July 2004.
It is becoming increasingly clear that if we are to evolve the task of managing our infrastructure we need to manage in both the normal and disrupted states of the enterprises operation. Ideally, an organization might have a modular suite of applications that participate in the management of the transition from normal to the disruptive state and back again in a controlled and safe manner. The applications strategy is made up of five modular parts:
  • Installation Design: A virtual design environment that simplifies the creation of installation and recovery packages. The goal is to improve and reduce the amount of expertise and effort required to create an installation environment.
  • Software Provisioning and Delivery: A centralized delivery environment that automates the local and remote installation of computer operating environments.
  • Patch Management and Help Desk Operations: Local and remote operations that assure the currency of software and automate problem management.
  • Asset Management: This is one piece of the lifecycle that is often taken for granted, but is an important foundation. Auto-discovery, inventory, software usage and license monitoring, plus disposal, repurposing and reporting are elements of the asset management used by most of the applications in this set.
  • Protection, Recovery, and Archive: A hardware-independent, local and remote, automated backup, recovery, and archive environment. IT needs the ability to get to full working condition in a short period of time.
A holistic strategy will allow IT organizations to become more efficient—personnel will have more time to focus on important projects, rather than dealing with urgent security issues. By involving all relevant IT and management groups with a common goal of securing the enterprise, the solution becomes fully integrated, rather than fragmented. The benefits are numerous, including increased security and availability, reduced human intervention, competitive advantage through rapid response to change and improved governance and compliance.

By implementing a scalable, platform-independent architecture, that addresses security, storage and systems management, IT will find it much easier to stay on top of that checklist.

"The only truly secure infrastructure is a managed infrastructure!"


What's the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 11th