The Gloves Are Off Taking The Fight To The Spammers
by Matt Peachey - Regional Director, Northern Europe, IronPort Systems - Friday, 16 September 2005.
Building on past mistakes, the integrated security appliance was built to be easy to use and manage in-house while bringing control back to the customer. Unlike the outsourcing model, where by an outsider creates the policy, it allows the user to apply their own policy as and when they want, according to the nature of threats that are occurring on the network. This makes it more relevant to the nature of their business and does away with the one-size-fits-all approach. Security threats change daily and policies need to reflect this.

An appliance is built for ease of management; any organisation can deploy an appliance without expensive technical staff to manage it. According to the PWC survey, only one in ten companies have staff with formal information security qualifications.

An integrated security appliance has all the advantages that bolt-on products and a third-party approach bring, but none of the pitfalls. Its proactive nature means that it scans for viruses and spam 24/7 and delivers levels of protection, which organisations cannot economically achieve with other security management approaches. This reduces cost and administration over-head for organisations desperate to cut costs.

Keeping up with the sheer number and types of security threats emerging every day is no easy task. But as the new year begins, it should be every company’s new year’s resolution to ensure IT security management is one of their top priorities in 2005.

IronPort Systems are exhibiting at Infosecurity Europe 2006. Held on the 25th – 27th April 2006 in the Grand Hall, Olympia, this is a must attend event for all IT professionals involved in Information Security.


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th