Computer Crime Research Center

hack/Hakc07.jpg

Internet transactions and security

Date: February 16, 2006
Source: InformationWeek
By: Larry Greenemeier

With Internet-based transactions and interactions growing at an explosive rate, it's incumbent upon providers of the networking equipment that runs the Internet and private networks to make security easy to deploy and comprehensive in coverage. If companies such as Cisco Systems don't integrate security into the fabric of the network, the much-hyped concept of trusted computing simply cannot take root; company chairman and CEO John Chambers said Wednesday during his RSA Conference 2006 keynote. "Security is not number one on CEOs' minds; growth is," he added.

Increasingly, the network has become the platform for interactions. Security point-products must as a result move into the network fabric, Chambers said. To meet these needs, Cisco has expanded its security offerings through acquisition and through partnerships. The company now has more than 65 partners for its network-admission control, or NAC, technology initiative, up from 30 a year ago. This type of coordination isn't easy. In fact, Chambers said, "partnering is much harder than acquisitions." As a result, Cisco has bought 15 security technology companies over the past few years.

In addition to looking outside the company for help with initiatives such as NAC, which requires devices trying to connect into a network to prove that they are free of infection before the connection is completed, Cisco this week introduced integrated security technology and security management software aimed at helping companies respond quickly to security threats and instill confidence in the integrity of their networks.
Original article



Add comment  Email to a Friend

Discussion is closed - view comments archieve
2006-09-23 06:55:18 - i need full detail of the Transactions... S.casmir
Total 1 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo