Endpoint security: From chaos to clarity
One of the greatest challenges organizations face in maintaining security is managing security gear from all the many different security and network equipment providers. The reality is that these applications still are complex and don't interoperate well, working directly against security professionals, network equipment providers, security vendors, and system integrators.
For instance, security vendors, such as Symantec and Kaspersky Labs, need to know that their applications can interoperate with all of the leading network equipment providers, while end users need to know that the equipment they buy from multiple vendors can be integrated properly–not only to keep down operation costs but also to be sure that new solutions work properly with such security initiatives as network access control.
What's needed is every provider in the technology chain – the users, builders, and implementers–to know to a high level of certainty that the security applications they deploy can work together with their current infrastructure without requiring substantial, time-consuming integration efforts.
There are many ways to try to achieve this – XML interoperability, third party testing labs and strategic vendor partnerships. For our efforts, we've turned to the open, industry-wide OESISOK* certification program. While OESISOK won't put an end to the current security integration challenges, it does go a long way toward providing the clear integration path necessary for the deployment of effective security technologies that will, finally, work together without too much patchwork.
*When a security application is designated OESISOK [www.oesisok.com], it is considered to be compatible with many network connectivity and other system health verification solutions. Before OPSWAT designates a security application OESISOK, the application must satisfy all criteria outlined in its respective document.
From the - February 2009 Issue of SCMagazine »