Jul 012011

What is happening with smartphones, tablets, and other devices is that with having this equipment in the workplace, IT may now be required to provide access and support for the users.

It used to be that one could offer a Blackberry device and you’re done. Users are happy and you are safe and secure.  Now with proliferations of consumer devices like iPads, etc., offering only Blackberry as a solution is no longer an option.

A Whackamole situation is now emerging; where you attack the head that pops up with the mallet, hoping it will not reappear but it always does. How do you embrace these devices and have a security architecture and policy framework that accommodates these various devices?

Architecture decisions are at the core of this topic.  I really don’t care which Suite you chose (Vmware, Citrix, Microsoft, etc.) in the diagram below. What I do care about is can you answer and deploy your apps to BYOD gear in these 6 areas?

Also, can you confidently prove how you plan on granting access to your applications using various devices across your architecture?  You are responsible for granting ‘cross device access’.

How can ubiquitous access be granted with the fewest, fewest, simplest methods possible?  It all starts with architecture which you can see below.

Jun 052011

DavCo enlisted RedZone Technologies – a key sponsor of the CIO Executive Series – to help DavCo become fully PCI compliant within a secure remote network. 

Watch Stacy Duncan, IT Director at DavCo and James Crifasi, CTO at RedZone Technologies as they share how they successfully implemented SonicWALL solutions to achieve PCI compliance for DavCo.

Mar 092011

Secure? Please!

Here is a quote from my CTO at RedZone, “While testing the new SonicOS 5.8 code in our office that included the new application capturing signature database currently recognizing geometry homework over 2,800 applications and millions of malware threats, in the first few minutes we were able to see that Bill’s pc (that is me…. CIO Exec Series Founder) was sending data via the google toolbar even when he wasn’t using it. Also my team was able to see with SonicOS 5.8 that a single computer with Tweetdeck (a social media tool that consolidates Twitter/LinkedIn/Facebook communciation) took more bandwidth than we ever thought was possible and was more bandwidth intensive than synchronizing Exchange and DFS.”

Tweetdeck and Hootsuite and other social media are handy social media management software tools that marketing uses. The net net here is take control of your desktops. Any company that has to fly a mission “do no evil” is up to no good. Use these products as needed, but eliminate the tool bar.

It serves no good corporate purpose.

Summary – The SonicOS 5.8 has very versatile and powerful web 2.0 security controls for outbound traffic. Perfect!

If you would like more information about how to do this and what products are perfect for this let me know billm@cioes.org