Nine elements to secure your ebusiness future


Hargitai Zsolt <RJekler@novell.com>

Novell Magyarország


Keeping the bad guys out – while letting the good guys in – is what e-security is all about. With so many ways for the bad guys to damage an ebusiness, a broadly based policy is required to ensure complete control over who can do what in the “one Net” ebusiness environment. Yet, as research by IDC discovered, determining and then implementing such a consistent policy are the two greatest obstacles facing companies when they tackle e-security.


In response, Novell has come together with its strategic e-security partners to create a coherent e-security policy framework which clearly sets out what companies have to do to secure their ebusinesses. Recognising that no one vendor has all the answers to the e-security challenge, the Nine Elements of e-Security combines best-of-breed security solutions within an integrated and highly scalable management system, underpinned by the Novell NDS eDirectory. This gives companies control over all aspects of their growing “one Net” ebusinesses from a single point, even across the mixed distributed IT systems found in most companies today. Single point of control makes it easier for companies to plan, monitor and enforce an effective security regime.


Nine Elements of e-Security


As an integrated package, the nine elements together allow companies to build a complete security cycle that offers protection from unauthorised access, detection of any possible security vulnerabilities and rapid correction.


  1. Firewall. Protecting against both internal and external threats, firewalls secure customer, partner and employee access over the Internet

  2. Single Sign-on. Removes the administrative burden of multiple passwords and reduces the common risk of employees writing down their passwords

  3. Virtual Private Network. A cost-effective and safe way to securely connect remote users and offices to corporate information

  4. Authorisation & Authentication. At the heart of ebusiness security, authentication proves that users are who they say they are, and authorisation then grants them access to the level of information to which they are entitled

  5. Secure Business Communications. With more collaborative working, a secure instant messaging environment is vital for effective team communication

  6. Certificate Management. The securest way to validate and protect information on the Internet, this uses encryption to scramble data and then reassemble it when it arrives with the authorised recipient

  7. Intruder Detection. To prevent, monitor, block and expel unauthorised users

  8. Virus Protection. To guard all possible virus entry points

  9. Network control. Simplified management facilities that automate many of the key security administration functions




1