Feeds

Corporate portals – the security risks

You are the Weakest Link. Hello

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Corporate portals, heavily touted by numerous vendors as a way to open up business processes on the Web, could also make life easier for hackers, the Yankee Group warns.

The analyst firm has issued a cautionary report, Corporate Portals Open the Door to New Security Concerns, pointing to the dangers inherent in extending access to a wide variety of partners and suppliers.

You are the Weakest Link. Hello

When companies extend their business processes to partners through portals, the potential for security breaches increases because a system is only as secure as its weakest link.

Access to sensitive data or applications, commonly published through portals, is often set up without adequate secondary safeguards beyond setting up an encrypted session, Yankee warns.

Firms should take time to define possible security problems before deployment and consider the use of managed services and outsourcing as a way of managing the security exposure while achieving the business benefits of using portal technology, Yankee advises.

But current versions of portal software fail to provide adequate security controls and security software is not "fine-tuned" for the environment, according to Matthew Kovar, director of the Yankee Group's security solutions & services research and consulting practice.

Consequently, it's a complex job to set up end-to-end security (which provides adequate authentication, access control and auditing) within a portal environment. This complexity makes it more likely that hacker activity will go unnoticed. ®

External links

Press release on Yankee's report Corporate Portals Open the Door to New Security Concerns

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.