Low level of security in RP firms deplored

How can you protect your network and computer systems against hacking? Is it enough that you set up firewalls?
Written by ZDNet Staff, Contributor

How can you protect your network and computer systems against hacking? Is it enough that you set up firewalls?

13 June 2000 (Manila Bulletin) - Network administrators are faced with the challenge on how to secure their networks and computer systems against virus, hacking and other forms of intrusion. The recent “love bug” virus that infected millions of computers worldwide was a not only an eye opener but a challenge to network administrators against virus, hackers or intruders.

Dean Mansfield, Network Associates, Inc. (NAI) vice president for Asia Pacific, said that the level of security of most companies and organizations in the Philippines is not acceptable.

It is difficult to determine if your website had been hacked or an intruder has breached into a network.

Mansfield suggested that a company must have an evolving security policy for their network and computer systems that include vulnerability testing.

Gerald Penaflor, NAI country manager for the Philippines, Thailand and Vietnam said there is a need for a continuing education on the security measures to improve the level of awareness of users coupled with the personal responsibility of users.

Penaflor said NAI has forged a strategic partnership with AMA, one of the country’s leading IT educational institutions to offer courses on security technology and solutions.

Network Associates International (NAI), one of the leading suppliers of security and availability solutions for e-business has unveiled “Active Security,” a new approach to automating enterprise security.

Mansfield noted that an independent security organization is necessary to look into the level of security like the ITAC (IT Audit & Consulting Pty Limited) of Australia.

To help companies address the security problems of their networks, NAI has unveiled “Active Security,” a new approach to automating enterprise security.

The “Active Security” technology enables Network Associates’ best-in-class security products to work in connection with partner technologies to create a “self-securing” environment which shares information across the network and reacts in real-time to detect breaches in security.

It enables automated enforcement of a company’s security policies including active responses to security breaches as they occur. This would allow the network to automatically identify and disarm potential network threats like virus outbreaks or hacker attacks.

For instance, if a hacker breaks into a corporate network, Active Security products would detect the attack, lock down access at the firewall and send an automated response to a security communications center which in turn will trigger responses on all systems connected to or affected by the target of the original attack.

The system could also attract the hacker into a virtual “decoy” network, distracting them and allowing the company to track the source of the attack.

Another example is, if a critical virus is detected at on the end of the user’s desktop, the security communications center could be instructed to automatically remove that system from the network and immediately alert administrators to prevent further infection.

The “Active” ingredient in Active Security is Network Associates’ new secure communication coordinator called Event Orchestrator, the key link that ties together NAI’s industry leading security products including McAfee Total Virus Defense, PGP Encryption, Gauntlet Firewall, and CyberCop Intrusion Protection with technologies from partner companies.

Mansfield said Network Associates has set a new standard for information security, going beyond simple product integration to a new paradigm where distributed components actively collaborate to keep a network secure.

Network Associates also announced new best-in-class security products — Gauntlet Firewall 5.0, CyberCop 5.0 and PGP VPN 6.5.

Each product enables clients to move towards an Active network security system that polices the network for intrusion, automatically manages the event based on planned procedures, alerts the IT department and recommends the next steps.

Network Associates’ Active Security has gained the support of world’s most influential integration firms including Ernst & Young, KPMG, PricewaterhouseCoopers and GTE Government Systems.

Editorial standards