IT WEEK • 20 SEPTEMBER 2004 CONTENTS 40 INTERVIEW Rob Clyde of security specialist Symantec on the latest techniques to combat growing online dangers 40 COMMENT A Home Office desktop migration project shows how training can help firms get more value from IT and improve productivity, writes Madeline Bennett 37 INTERVIEW Rob Clyde, chief technology officer at security specialist Symantec, explains how behaviour blocking and client compliancy systems can protect companies MANAGEMENTWEEK WHERE TECHNOLOGY BECOMES BUSINESS REALITY Editor: Madeline Bennett Outsourcing to go on tap I T outsourcing services will become commoditised, making them similar to utilities, and resulting in cheaper deals for firms, the UK head of Unisys has predicted. He forecast that offshore IT services will also become more popular. Brian Hadfield, managing director at the IT services firm in the UK, said the future of outsourcing would see a move to packaged offerings and away from one-off, specialist deals. “We believe the ability to take an outsourcing venture and grow it into a utility is important,” he said. “You get economies of scale, which can be passed on to the customer.” Hadfield predicted that demand for outsourcing would grow in a number of areas, including supply chain management, logistics and customer relationship management. “You’ll see a transition from outsourcing the back office to the middle and front-end. People will start taking a look at outsourcing these activities.” Hadfield predicted that in order to focus on their core competencies and dif- ferentiators, more organisaalmost a third of firms are OFFSHORE OPTIONS tions will begin to offload planning to offshore IT infraActivities firms plan to tasks to outsourcers such as structure during the next year, offshore in the next year Unisys. “We see particular and the same proportion are Application 66% growth in business process maintenance researching the possibility. Application outsourcing,” he added. Application maintenance 65% development Hadfield also anticipated came top of the list, with Business 34% growth in offshore IT outmore than two thirds of processes Infrastructure sourcing. “We do some offcompanies planning to move 30% management shore work and have made this activity offshore in the Source:Wipro investments in this area,” he coming year. And 34 percent added.“The ability to lower costs by doing plan to offshore some of their business work offshore will be attractive to cusprocesses within the same timeframe. tomers and suppliers.” However, firms are Spending on offshoring is set to grow. likely to be selective about the projects and Almost 90 percent said their organisation activities sent abroad, he predicted. would increase its expenditure this year, by Hadfield acknowledged that offshore an average of 34 percent. providers will have to reassure customers The results indicate that offshoring has about security and the quality of the end entered the mainstream, according to Sudproduct, but argued that when offshore ip Banerjee, president of Wipro’s enterprise projects run into difficulties it is not always solutions division.“There is a clear indicathe fault of the service providers.“It might tion that various global organisations have be that the activity was the wrong choice gained confidence to offshore new and for offshoring,” he argued. complex service lines like IT infrastructure IT services provider Wipro agreed with management and critical business processUnisys that there is growing interest in offes,” Banerjee commented. www.unisys.com www.wipro.com shoring. Its recent research suggests that Analytics to extend BI Madeline Bennett such as supply chain management and sales may help firms to achieve better yperion will release a new version of returns from their BI investments. its analytics software today, to give Hyperion said the Olap server could analysts and business users faster and betscale to terabytes of data and provide fast ter insight into their firms’ operations. responses to thousands of concurrent Essbase 7X combines analytics capausers, thanks to Aggregate Storage techbilities with a new intuitive interface, to nology, which compresses data footprints help users in sales, logistics and human and increases query return speeds. resources departments deal with financial Hyperion plans to make the latest verand business data, said the business intelsion available on Itanium 64bit systems, ligence (BI) tools vendor. which could further improve performance. A Visual Explorer feature can The new release also offers better help users to visualise large data integration with SAP’s NetWeaver volumes across a range of business software and support for Red Hat dimensions. And drag-and-drop enterprise Linux, said the firm. capabilities are designed to make it Henry Morris of analyst comeasier for technical and non-techpany IDC said, “With the new nical users to get more insight into release, scalability is improved, business operations. expanding the range of applicaThe ability to conduct finantions that Essbase can support.” cial and business analysis through Sullivan: better Hyperion will also release its a single analytics system in areas profitability tools Profitability Management system H itweek.co.uk Matt Hicks ANALYSING BUSINESS DATA today updates its analyt• Hyperion ics software to make it easier for • • staff to examine business data. Essbase 7X offers an intuitive interface, which lets users visualise large amounts of business information. It may help firms get better returns from business intelligence tools. today, designed to help firms understand their most and least profitable customers, products, regions and channels. The software, which integrates with Essbase 7X, offers reports, dashboards and advanced analytics to assess areas such as customer purchasing behaviours, costs of acquiring new customers, and potential profitability over time. Godfrey Sullivan, Hyperion’s president, said Profitability Management combines Hyperion’s technology with best practices, methodologies and services to make it easier for customers to understand profitability at a granular level. www.hyperion.com © eWeek USA 2004 Madeline Bennett Free tools police P2P and IM use IMlogic has issued free tools to help firms detect and block the use of instant messaging, peer-to-peer file sharing and voice over IP applications. IM Detector Pro offers basic tools to help IT staff see the extent of such traffic flowing on their networks and decide how to best manage it, said Dave Fowler, vice-president of marketing and strategic alliances at the IM control specialist. With the use of IM and P2P increasing, firms face the risk of sensitive information being disclosed, employees illegally sharing copyrighted files, and viruses and worms entering their networks. Meanwhile, firms have to comply with corporate governance rules and act to prevent copyright abuse.“Ignorance is not a defence in a lot of these cases, and corporations and universities are just waking up to the fact that a lot of this is going on and that it does put them at risk,” said Fowler. He added that firms could use IM Detector Pro as a stopgap while developing more advanced plans to manage IM and P2P networks. One reason for IMlogic to offer a free tool may be to demonstrate a need for its gateway product for managing and securing IM, as the use of IM grows.According to Genelle Hung, analyst at research firm The Radicati Group, over 80 percent of firms have staff using IM or P2P. “But less than 15 percent have the necessary IM management solutions to protect against security breaches, meet corporate governance rules or avoid inappropriate file sharing,” she added. IM Detector Pro software can be downloaded at the first URL below. Threats and defences evolve, p40 www.imlogic.com/imdetectorpro www.eweek.com 39 © eWeek USA 2004 40 COMMENT How to get more from staff MANAGEMENTWEEK IT WEEK • 20 SEPTEMBER 2004 Why it pays to train A major desktop migration project at the Home Office shows how training schemes can help organisations to improve efficiency and get more out of IT, says Madeline Bennett I came across an interesting story recently on the deployment of new IT systems going hand in hand with staff education. The training in question will offer a blend of physical presentations and online material. It seems the Home Office is upgrading the desktops of its 15,000 staff to Windows XP and Office XP from older versions of the operating system. Training provider KnowledgePool will help Home Office employees make the transition to the new system. This is a good example of the government following its own advice by attempting to improve its operations, using the latest technology. However, simply rolling out the latest software does not mean employees will make best use of the new resources. An IT training expert at the Home Office points out that it is largely the training going on alongside the upgrade to XP that is expected to improve the productivity of staff. For the training package, KnowledgePool will offer face-toface briefing sessions at various Home Office sites across England and Wales, demonstrating the latest applications and how they differ from older ones. These sessions will be supported by an e-learning package, which focuses on new features in XP and organisational policy for using the latest software. The mix of instructor-led sessions and e-learning modules, which will enable users to dip back into advice after attending training periods, should help most employees get to grips with the new systems. So thumbs up to the Home Office for embarking on such an extensive training programme, which seems to cover all eventualities – there’s even a 15-minute video available for those who miss their designated seminar. But this good example of IT education also highlights how most UK organisations are failing in this respect. According to the British Computer Society, fewer than four in 10 adults have received any kind of formal IT training or achieved an IT qualification. Although programmes such as the European Computer Driving Licence exist, most employers expect their staff to either come fully equipped with the required skills for tasks such as using the internet or spreadsheets, or rely on colleagues and on-the-job training. Some firms worry that if they provide basic IT training for staff it will encourage them to try to fix their own IT problems and might actually cause more harm than good. But training courses could cover exactly this kind of issue, educating users on what they should and shouldn’t touch. Other employers express concern that by funding IT training courses they would simply provide staff with qualifications that would help them get jobs elsewhere. But Threats and defences evolve Symantec’s Rob Clyde explains how behaviour blocking and client compliancy systems could improve corporate security SECURITY INTERVIEW BY IAIN THOMSON ITWeek: As chief technology officer at security specialist Symantec, what do you think are the biggest dangers to IT? Rob Clyde: Virus threats will continue to drive the business of security. Viruses attacked 92 percent of firms last year, and the rest probably were attacked and just didn’t notice it. The number of malware attacks has also increased and continues to rise, as have network intrusion attempts. Attacks are becoming more complex and that’s the most troubling aspect. How can the virus threat be overcome? Reactive, signaturebased protection is becoming less effective. The time from software patch to ex Clyde: more proactivity 40 ploit is dropping below the time needed for companies to install the patch. Even if you start when the patch is released, most IT departments will take 30 days to test and patch a system and hackers are faster than that now. We’ll still need signatures but a new, predictive approach is necessary. What technologies should companies be looking at now to make their network defences more proactive? Behaviour blocking looks promising. This mimics how biology deals with viruses, by identifying anomalies before they get serious. For example, it’s very unusual for a normal email message to contain an executable program, so why not quarantine them when they do? Client compliancy is another useful approach. When you connect into the network it can check to see if your system’s hardware and software is properly protected. If it’s not, organisations can block off or limit access. Do you think there will be an improvement in the security of software? We see 53 vulnerabilities in software products discovered every week, 80 percent of which are of high severity. This figure of 50 or so a week has hit a steady state and could be an equilibrium point. Personally, I think we’re at a knee in the vulnerability curve and the numbers will continue to rise as new, more feature-rich operating systems come on the market. Do you think that the open-source community is better at patching holes than commercial software vendors? With open source, if an individual cares about a code flaw they’ll fix it fast. If, however, it’s an obscure piece of code it could languish for years untouched. Commercial companies will try and patch all problems within a fixed timescale. Most commercial vendors are really keen on reporting problems honestly and trying to fix them. I don’t know of a single vendor who will sit on a vulnerability – maybe that would have happened five years ago, but not now. Is outsourcing a good option for security? It varies for different industries. Manufac- this is short-sighted – if companies don’t offer training, they won’t see the benefits of a properly educated and IT-literate workforce. With properly trained staff, firms would be in a better position to identify new ways of using technology to boost business operations and improve efficiency, while minimising future training costs. The advantages are clear. Instead of relying on others – schools, universities etc – to provide their staff with proper computer training, firms should be taking it upon themselves to assess and improve the current IT skills of their employees. ITW www.tinyurl.com/5tl6n [email protected] ABOUT ROBERT CLYDE Clyde is chief technology • Rob officer at Symantec, where he sets • • the security company’s technology vision and strategy. Clyde has over 25 years experience in the security business, almost exclusively in Fortune 500 companies. He was part of the founding team of security firms Axent Technologies and Clyde Digital Systems. turing loves to outsource, for example. Even industries like the banking sector, that you’d think would do security themselves, outsource some functions. Most experts suggest that you should never outsource policy development. It makes a lot of sense for smaller companies to outsource everything but there’s a job of education to be done first. What advice can you offer IT managers interested in the security business? If you’re looking for a long-term lucrative career, security is where to go. There are very few computer security PhDs coming out these days – only 17 in the US last year for example. We didn’t get any of those, most stay in academia. Part of the problem is that this is a new area. Until recently you could not get a degree in computer security. ITW itweek.co.uk
© Copyright 2026 Paperzz