Agreed.

On Mon, Apr 15, 2013 at 2:44 PM, Andrew S. Baker <asbz...@gmail.com> wrote:
>
> The biggest problem I see with the "new perimeter" discussions is that
> people keep advocating leaving the old perimeter.   That's the part that
> always gets me.
>
> Acknowledging that data protection is best done near the data container is
> fine.   Abandoning all other posts, some of which contain other assets that
> need to be protected is not wise.
>
>
>
>
>
> ASB
> http://XeeMe.com/AndrewBaker
> Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…
>
>
>
>
> On Mon, Apr 15, 2013 at 3:28 PM, Michael B. Smith <mich...@smithcons.com>
> wrote:
>>
>> I've had several issues with his thinking in the last couple of years.
>>
>> Don't get me wrong - in his subject area (which I typically think of as
>> VDI/RDS/Citrix) he's a really smart cookie. But he's been veering into the
>> wild blue yonder on other things...
>>
>> -----Original Message-----
>> From: Kurt Buff [mailto:kurt.b...@gmail.com]
>> Sent: Monday, April 15, 2013 3:19 PM
>> To: NT System Admin Issues
>> Subject: Re: Some interesting thoughts about network security
>>
>> On Mon, Apr 15, 2013 at 5:23 AM, James Rankin <kz2...@googlemail.com>
>> wrote:
>> > http://www.brianmadden.com/blogs/brianmadden/archive/2013/04/15/rethin
>> > king-network-security-all-your-on-premises-wifi-users-are-actually-quo
>> > t-remote-quot-users.aspx
>> >
>> > --
>> > James Rankin
>> > Technical Consultant (ACA, CCA, MCTS)
>> > http://appsensebigot.blogspot.co.uk
>>
>> Yeah - he's wrong.
>>
>> ----------Begin Quote----------
>> "I can never allow non-trusted devices on the corporate network"
>>
>> You need to redefine your definition of "corporate network." Your
>> corporate network is the tight boundary that's around your servers or
>> whatever else you're actually trying to protect. There's no point to
>> protecting your entire user-land network. Just make it "the internet"
>> and move on.
>> ----------End Quote----------
>>
>> When I can keep all of the IP and other confidential data to the company
>> off of  end user devices (and by this I mean "not stored to local
>> non-volatile storage, encrypted or not"), I can consider that.
>>
>> In the meantime, the boundary extends well beyond my servers.
>>
>> Kurt
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
>> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ---
>> To manage subscriptions click here:
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to listmana...@lyris.sunbeltsoftware.com
>> with the body: unsubscribe ntsysadmin
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to