TITLE

Managing Global Networks

AUTHOR(S)
Drogseth, Dennis
PUB. DATE
February 2005
SOURCE
Business Communications Review;Feb2005, Vol. 35 Issue 2, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information on the global network. Achieving and maintaining a smoothly functioning global network presents multidimensional requirements in technology, security, process, organization and culture. Whether one is stepping up to a global environment for the first time, or taking a renewed look at the international requirements, the basic advice is the same: Assess the situation up front before taking targeted and prioritized action to wrestle the most critical issues to the ground first. It is challenging to clean up the old, while remaining proactive in assessing new technologies and staying abreast of the human and cultural issues. Perhaps the biggest potential pitfall is trying to do too much at once. Global networks are not amenable to achieving or maintaining static, even well thought out image of perfection. Things change, and one will face ongoing requirements to adjust, reprioritize and compromise. But having a well-established baseline, with a clear plan for prioritized action, can make facing those changes a much more successful experience for one and his organization. INSET: The Bigger The Net, The More You Need An Audit.
ACCESSION #
15951346

 

Related Articles

  • The Road Less Traveled: How to Become an IT Security Professional. Rogers, Bobby // Certification Magazine;Oct2006, Vol. 8 Issue 10, p30 

    This article offers advice on how to become a successful information technology (IT) professional. Once IT professionals decide to become a network security engineer, they have made a choice that will drive everything they learn and do from that moment forward. Some of the new hobbies a network...

  • Rights of Passage. Bowers, Tom // Information Security;Apr2005, Vol. 8 Issue 4, p44 

    Evaluates several products for network and information security in the U.S. as of April 2005. Check Point Integrity 5.0 from Check Point Software Technologies; Enterprise 1.5 from ENDFORCE; CyberGatekeeper 3.0 from InfoExpress; Endpoint Security Suite 3.0 from Senforce. INSETS: ABOUT THIS...

  • Look after your network. Ecott, Tim // Computer Weekly;9/2/2003, p25 

    The article discusses issue of computer network security for the high technology industry. The experience in the industry has shown that businesses are becoming complacent and failing to test the resolve of their security measures. The importance of measures such as virtual private networks,...

  • FTSE firms address IT security in new forum. Saran, Cliff // Computer Weekly;2/27/2004, p1 

    The heads of IT security at organisations with a combined IT budget of more than £10bn have formed a forum to drive forward a new approach to security. Ten organisations, including the BBC, BP, ICI, Royal Mail Inc. and the government, were represented at the inaugural meeting of the Jericho...

  • DHS vacancies strain cyber-security agenda. Fisher, Dennis // eWeek;3/14/2005, Vol. 22 Issue 11, p11 

    This article presents information related to the cyber security agenda of the Department of Homeland Security, which is straining the relationship of DHS with key private-sector allies and hampering government efforts to improve security on public and private networks. The federal government's...

  • Key to success.  // Westchester County Business Journal;4/5/2004, Vol. 43 Issue 14, p33 

    Focuses on the effort of Jeff Minushkin and his Washington, D.C.-based Priva Technologies Inc. to win businesses over to enhanced security systems. Features of Priva's Cleared Key, a device that protects against unauthorized entry into computers and other electronic gadgets; Limitations of...

  • Arbor Networks tracks worm-like behaviour. Gomm, Karen // Computer Weekly;6/29/2004, p36 

    Security supplier Arbor Networks Inc. has released Peakflow X 3.0, an internal network security system that aims to detect worms and protect systems from them. Rather than check worms and viruses against an existing signature, Arbor Networks said Peakflow X analyses the flows and relationships...

  • Knowledge is Power. Martin, Jennifer // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p62 

    The article discusses the power of knowledge in the security systems industry. Education has become the deciding factor in every success or failure with evolution of technology and the ever-increasing demand of sophisticated security systems from end-users. One driver for education is the...

  • Understanding Networking is Future-crucial. Engebretson, Dave // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p65 

    The article focuses on the significance of understanding IT-networking enabled technologies for security systems integrators. They are continuously being faced with new ways of installing security systems and end-users are experiencing new ways those systems can be used. The IT industry is far...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics