Understanding the Relationship Between SAM and Security

Mobility, virtualization and the cloud affect an organization’s security posture.
Security and IT asset management go hand in hand. Mobility, cloud computing and virtualization complicate them both. Mobility and cloud put more software outside the traditional network perimeter. Virtualization balloons the instances of licensed software. Most organizations have software running both inside traditional network firewalls and outside on devices connected over wireless links. These hybrid infrastructures present challenges to both security and software asset management. From a security standpoint, mobile devices share many of the same threats that desktop computers confront. But they also bring threat vectors of their own, such as data exfiltration from unauthorized or nonquarantined applications, mobile malware and loss of the device itself. From a software asset management standpoint, mobile devices amplify the possibility of problems with license management, such as having more copies than needed or more than the enterprise is authorized to have under a volume license agreement. Shifting Security Threats The past year has produced sensational news of data losses, network penetration and malware implanted using social engineering techniques. For many, the case of former National Security Agency contractor Edward Snowden made real the insider threat. Snowden was hardly the first. For more than a decade, the U.S. Computer Emergency Readiness Team (US-CERT) has been studying insider threats. There are two basic types: inadvertent losses that result ...

Login or Register to Download This Resource and Access All of Our Premium Content

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.
A valid email address. All emails from the system will be sent to this address. The email address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by email.
Several special characters are allowed, including space, period (.), hyphen (-), apostrophe ('), underscore (_), and the @ sign.
Please indicate your areas of interest:
koo_mikko/iStock/ThinkStockPhotos
May 12 2014

Sponsors