![]() |
![]() |
![]() |
![]() |
![]() |
The only publication dedicated to OSS Volume 1, Issue 5 - September 2004 | ![]() |
![]() |
Tracking the Elusive "IP Application" (cont'd) Security Management IM alone opens networks to viruses and worms, identity theft, firewall tunneling, data security problems where users may communicate trade secrets over unsecured channels, and “spim” – instant messaging spam that already makes up 5 to 7 percent of IM traffic, according to Network World (June 28, 2004). These are primarily network and policy security issues – in other words, users are accessing unsecured network services. If prevented from using public services, but given access to secure alternatives, users can be sated and these problems largely avoided.
Identity Management Identity management is critical, however, in business environments where people work with multiple suppliers' systems, or multiple web interfaces in general. Single sign-on across partner domains, for example, is a key productivity feature on which networked applications rely. This kind of capability can't be shot down, so it must be secured against identity theft. Corporations are just beginning to turn to technologies like biometrics, thumb prints, and various automated password reset and encryption features to insure users are who they claim to be. These technologies are critical but often inaccessible to a range of businesses for financial or expertise reasons, and thus another area where service providers can provide a staple support service while offloading cost and complexity for their best customers. In the end, this is what IP applications are all about – taking away the growing complexity and management burden associated with communications and recognizing that IT is part of it all. Enterprises are already spending billions on basic IT infrastructure that is, in function, common to them all. There is a clear economy of scale to be created here, and one that ASPs are trying their best to accommodate. In the end, however, it's the telcos that have the experience with scale, reliability and security to deliver what enterprises need in their core operations. What telcos have lacked thus far is direction and a realistic set of examples to follow from their advisors and suppliers.
© 2004, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law. |
![]() |