Welcome!

Containers Expo Blog Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Elizabeth White, Zakia Bouachraoui

Related Topics: Containers Expo Blog, Java IoT, Industrial IoT, Mobile IoT, Microservices Expo, Linux Containers

Containers Expo Blog: Article

Exclusive Interview with Robert A. Clyde, CTO Symantec

Exclusive Interview with Robert A. Clyde, CTO Symantec

The recent RSA Conference in San Francisco was well-attended by IT pros and the industry's leading security experts and executives. Among the crowd was Rob Clyde, the CTO at Cupertino, CA-based Symantec, one of the world's leading security software companies.

Q: Where is IT security going in a general sense?

Rob Clyde: Threats continue to increase in frequency, complexity, and speed. In 2003, we saw 900 million malicious code attempts and 140,000 network intrusion attempts. There were also seven new vulnerabilities discovered per day. We've reached an inflection point where today’s threats now move faster than our ability to respond. In the future we need proactive security strategies that enable us to get ahead of these ultra-fast spreading worms.


Q:
How are today's Chief Information Officers going to be sure that an enterprise, with tens of thousands of desktops, hundreds of servers, and dozens of partners and vendors with network access, will be secure and protect itself from blended attacks such as Blaster and Slammer?

RC: Protecting against today's blended threats requires an integrated approach to security. That means protecting the gateway, server, and client layers with multiple technologies including antivirus, intrusion detection software, firewalls, VPN, and vulnerability management integrated into one seamless solution.


Q:
Is perimeter security is enough in your view, or do CISOs now have to layer disparate security products at multiple tiers within their enterprise? If so, how do they do that most efficiently, and how do they best manage the process?

RC: Well, it is clear that the perimeter is disappearing and that a comprehensive approach to security offers the best protection. Integrated security solutions enable centralized configuration, deployment, installation, and policy management with simultaneous signature updates and rule changes as necessary. This type of integration enhances security and manageability while optimizing performance and return on investment.

This approach helps reduce the overhead, risk and administrative headaches that are common with disparate point products from multiple vendors. It also eliminates interoperability issues and simplifies the support and service environment.

At the same time it's clear that traditional security products and services only solve a portion of the end-to-end management challenge. Customers also need corporate-wide capabilities to centrally plan, track, and apply system hardware and software changes, including software distribution, configuration and patch management, and software license usage.

More Stories By Roger Strukhoff

Roger Strukhoff (@IoT2040) is Executive Director of the Tau Institute for Global ICT Research, with offices in Illinois and Manila. He is Conference Chair of @CloudExpo & @ThingsExpo, and Editor of SYS-CON Media's CloudComputing BigData & IoT Journals. He holds a BA from Knox College & conducted MBA studies at CSU-East Bay.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...