Intelligent CIO Middle East Issue 01 | Page 43

FEATURE: MULTI-LAYERED SECURITY databases, and applications. Remote Access • Control access to corporate assets from remote users, branch sites, partners, and contractors. • Assure a VPN with strong authentication and encryption is used to verify credentials and assure transmissions are protected. • Limit access through trusted sites by trusted users and devices only, making sure improper access over the gateway VPN is not obtained by unauthorized users. One of the weakest links in the security chain is Email – which is the preferred channel for business communications and thus continues to be a vector www.intelligentcio.com of choice for attackers. Hence, when companies within the region evaluate security or revisit what they already have, they should be sure to ask the following questions for more effective protection against spam, blended threats, and targeted attacks: 1. How do you deal with the variety of types of spam and viruses? We all know that there is no such thing as 100% protection but we can reach the 99%+ range by layering and integrating multiple antispam engines and multiple anti-virus engines. A security architecture that tightly integrates multiple engines and allows them to automatically and seamlessly work together not only increases protection levels but also INTELLIGENTCIO 43