Connect with us

Hi, what are you looking for?

Biz Solutions

Blue Coat touts a security model that empowers businesses

“Security is not just about what you prevent. Security is about what you make possible.” Thus remarked Blue Coat Systems, Inc.’s Chief Security Strategist and SVP Hugh Thompson, as he announced a new approach to security known as Business Assurance Technology, and the required core competencies to make this business empowerment security model possible, particularly in the Philippines.

“We think it can be transformative here in the Philippines particularly now that it is enjoying a high growth,” Thompson said. “But security technology has to be done correctly to continue this growth path.”

Thompson claimed he has seen the transformation in the way people work, in the way they integrate their personal technology with their business technology, and in the way they adopt a new technology personally and very quickly. “If you want to be productive, you work and you have no choice but to use the technology. You work because you have access to email and people expect you to be productive.”

These scenes are happening in the Philippines particularly because of the massive penetration of smartphones in the country. It was reported that an average person in Manila owns 4.6 connected devices. According to Thompson, the reason for this is because the Philippines, in general, tends to be a very social environment – that an incredible collaboration of workers creates a greater productivity for the Philippines.

“All these are changing how security is used even if the company has a policy on it. We’re moving to an idea of securing a perimeter that was defined, just securing users,” Thompson said.

Business Assurance Technology is a new approach that builds on sophisticated prevention methods with new technology that delivers value to the business users, customers and IT. It has five critical competencies or centers of excellence that businesses must have to be able to assure themselves of customers. These are Security and Policy Enforcement, Mobility Empowerment, Trusted Applications, Performance, and Resolution.

Security and Policy Enforcement consists of the rules of the business which, according to Thompson, are quickly changing. The aim is to reduce threats and data loss by scanning and blocking attacks, and enforce all security policies across the enterprise.

The second center is the Mobility Empowerment which is extended to mobile workers who have an average of 4.6 mobile devices to actually be productive and secure from untrusted devices, network connections, and apps at the same time.

Thompson believes the third center or the Trusted Applications is critical in the market. Users must be updated with the rapidly changing application landscape, and able to understand and control applications to prevent or reduce the increase in privacy and access risks.

Performance is important in security space as its purpose is to promote quality assurance, ensure quality of service, and optimize appliances. “It goes hand in hand with security – if you make the user’s experience terrible with the very secured solution, people would just work their way around it. Performance increases the users’ experience on whatever media they’re using – video, data, cloud, or Web,” says Thompson.

Thompson said that when bad things happen, resolution or the fifth center of excellence allows us to get down to the root cause of the problem. One must find a way to centralize and consistently manage policy across multiple clouds and systems.

Security in the past has been seen as prevention but it gets to a certain point where security technology connotes business empowerment. It is used to boost efficiency and productivity, increasing collaboration and accelerating innovation, optimize user experiences, and expand the power of technology.

“Securing the technology with the new security model is now in the hands of the users, being controlled by the users and perhaps by the business at the same time,” added Thompson.

“Security is not just about what you prevent. Security is about what you make possible.” Thus remarked Blue Coat Systems, Inc.’s Chief Security Strategist and SVP Hugh Thompson, as he announced a new approach to security known as Business Assurance Technology, and the required core competencies to make this business empowerment security model possible, particularly in the Philippines.

“Security is not just about what you prevent. Security is about what you make possible.” Thus remarked Blue Coat Systems, Inc.’s Chief Security Strategist and SVP Hugh Thompson, as he announced a new approach to security known as Business Assurance Technology, and the required core competencies to make this business empowerment security model possible, particularly in the Philippines. “We think it can be transformative here in the Philippines particularly now that it is enjoying a high growth,” Thompson said. “But security technology has to be done correctly to continue this growth path.” Thompson claimed he has seen the transformation in the way people work, in the way they integrate their personal technology with their business technology, and in the way they adopt a new technology personally and very quickly. “If you want to be productive, you work and you have no choice but to use the technology. You work because you have access to email and people expect you to be productive.” These scenes are happening in the Philippines particularly because of the massive penetration of smartphones in the country. It was reported that an average person in Manila owns 4.6 connected devices. According to Thompson, the reason for this is because the Philippines, in general, tends to be a very social environment - that an incredible collaboration of workers creates a greater productivity for the Philippines. “All these are changing how security is used even if the company has a policy on it. We’re moving to an idea of securing a perimeter that was defined, just securing users,” Thompson said. Business Assurance Technology is a new approach that builds on sophisticated prevention methods with new technology that delivers value to the business users, customers and IT. It has five critical competencies or centers of excellence that businesses must have to be able to assure themselves of customers. These are Security and Policy Enforcement, Mobility Empowerment, Trusted Applications, Performance, and Resolution. Security and Policy Enforcement consists of the rules of the business which, according to Thompson, are quickly changing. The aim is to reduce threats and data loss by scanning and blocking attacks, and enforce all security policies across the enterprise. The second center is the Mobility Empowerment which is extended to mobile workers who have an average of 4.6 mobile devices to actually be productive and secure from untrusted devices, network connections, and apps at the same time. Thompson believes the third center or the Trusted Applications is critical in the market. Users must be updated with the rapidly changing application landscape, and able to understand and control applications to prevent or reduce the increase in privacy and access risks. Performance is important in security space as its purpose is to promote quality assurance, ensure quality of service, and optimize appliances. “It goes hand in hand with security – if you make the user’s experience terrible with the very secured solution, people would just work their way around it. Performance increases the users’ experience on whatever media they’re using – video, data, cloud, or Web,” says Thompson. Thompson said that when bad things happen, resolution or the fifth center of excellence allows us to get down to the root cause of the problem. One must find a way to centralize and consistently manage policy across multiple clouds and systems. Security in the past has been seen as prevention but it gets to a certain point where security technology connotes business empowerment. It is used to boost efficiency and productivity, increasing collaboration and accelerating innovation, optimize user experiences, and expand the power of technology. “Securing the technology with the new security model is now in the hands of the users, being controlled by the users and perhaps by the business at the same time,” added Thompson. “Security is not just about what you prevent. Security is about what you make possible.” Thus remarked Blue Coat Systems, Inc.’s Chief Security Strategist and SVP Hugh Thompson, as he announced a new approach to security known as Business Assurance Technology, and the required core competencies to make this business empowerment security model possible, particularly in the Philippines.

“Security is not just about what you prevent. Security is about what you make possible.” Thus remarked Blue Coat Systems, Inc.’s Chief Security Strategist and SVP Hugh Thompson, as he announced a new approach to security known as Business Assurance Technology, and the required core competencies to make this business empowerment security model possible, particularly in the Philippines.

“We think it can be transformative here in the Philippines particularly now that it is enjoying a high growth,” Thompson said. “But security technology has to be done correctly to continue this growth path.”

Thompson claimed he has seen the transformation in the way people work, in the way they integrate their personal technology with their business technology, and in the way they adopt a new technology personally and very quickly. “If you want to be productive, you work and you have no choice but to use the technology. You work because you have access to email and people expect you to be productive.”

These scenes are happening in the Philippines particularly because of the massive penetration of smartphones in the country. It was reported that an average person in Manila owns 4.6 connected devices. According to Thompson, the reason for this is because the Philippines, in general, tends to be a very social environment – that an incredible collaboration of workers creates a greater productivity for the Philippines.

Advertisement. Scroll to continue reading.

“All these are changing how security is used even if the company has a policy on it. We’re moving to an idea of securing a perimeter that was defined, just securing users,” Thompson said.

Business Assurance Technology is a new approach that builds on sophisticated prevention methods with new technology that delivers value to the business users, customers and IT. It has five critical competencies or centers of excellence that businesses must have to be able to assure themselves of customers. These are Security and Policy Enforcement, Mobility Empowerment, Trusted Applications, Performance, and Resolution.

Security and Policy Enforcement consists of the rules of the business which, according to Thompson, are quickly changing. The aim is to reduce threats and data loss by scanning and blocking attacks, and enforce all security policies across the enterprise.

The second center is the Mobility Empowerment which is extended to mobile workers who have an average of 4.6 mobile devices to actually be productive and secure from untrusted devices, network connections, and apps at the same time.

Thompson believes the third center or the Trusted Applications is critical in the market. Users must be updated with the rapidly changing application landscape, and able to understand and control applications to prevent or reduce the increase in privacy and access risks.

Advertisement. Scroll to continue reading.

Performance is important in security space as its purpose is to promote quality assurance, ensure quality of service, and optimize appliances. “It goes hand in hand with security – if you make the user’s experience terrible with the very secured solution, people would just work their way around it. Performance increases the users’ experience on whatever media they’re using – video, data, cloud, or Web,” says Thompson.

Thompson said that when bad things happen, resolution or the fifth center of excellence allows us to get down to the root cause of the problem. One must find a way to centralize and consistently manage policy across multiple clouds and systems.

Security in the past has been seen as prevention but it gets to a certain point where security technology connotes business empowerment. It is used to boost efficiency and productivity, increasing collaboration and accelerating innovation, optimize user experiences, and expand the power of technology.

“Securing the technology with the new security model is now in the hands of the users, being controlled by the users and perhaps by the business at the same time,” added Thompson.

 

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Companies plan to increase their IT security budgets by up to 9%. The median cybersecurity budgets for large enterprises were US $5.7M with US...

HEADLINES

Globe has been a consistent advocate for a safer and more responsible digital space

HEADLINES

The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well...

HEADLINES

Financial phishing attacks are rapidly increasing in the country as cybercriminals continuously evolve and adapt their tactics, making them sophisticated. The number of attacks...

HEADLINES

A Scale of Harm study by the International Justice Mission revealed that almost half a million Filipino children were trafficked to produce new child...

HEADLINES

Yondu launched an extensive, month-long cybersecurity awareness campaign focused on modern threat detection, incident response, and social engineering defense.

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

Advertisement