Archive for August, 2009

Prison Break

August 10, 2009

When one thinks of technology, we think of new, innovative products that are going to make our lives easier.  When I think of Network technology, I think of the same thing;  I hope to see new hardware and software that is going to increase productivity and make life easier.  Over the past few years, I have seen a great battle between hackers trying to get into systems, and security experts trying to keep them out.  There have been great advancements in firewall technology, anti-virus, NAC, and general security best practices, but every innovation has been a reaction to the latest virus, hack, etc. Now, instead of being innovative, the security industry has decided the only safe thing to do is lock down their systems.  This reactionary approach to security only curtails productivity by limiting the freedom of your workers.  It is time for a Prison break!

In today’s world, it blows my mind that our reaction to security threats is to close down the network.  Everyday I talk to people who limit access to the Internet, email, remote access, and even the use of USB devices.  Really?  I cannot work at night because I am not granted access to our precious network?  The problem is that the network IS precious, or should I say, the data on the network is precious.  Every system has a database of information that would be valuable to others, but by limiting the freedom of your workers, you are cutting productivity and profits.

Instead of shutting everything down, the network needs to be monitored and protected.  I look at it the same way I look at the security system in my house.  I need to be able to come and go as I please, but I do not want everyone to have that freedom.  I have a checklist of things I need to do to keep the house secure: lock the doors, set the alarm, put lights on a timer, etc.  For the network, I want everyone who is authorized to have the freedom to come and go as they please.  Software like Clear Blue Security monitors your network at the endpoint level.  It makes sure that your security checklist is constantly being followed.  For example, do all the endpoints have up to date anti-virus?  Are there unnecessary open ports?  Is there suspicious traffic on the network?  How many admins can log into a server or endpoint?  What programs and software is on my network that might be harmful.  The  list goes on, and an individual “security best practices” needs to be created for a company’s specific needs.

My company, Clear Blue Security, offers a 100% free SaaS based Endpoint Security Monitoring tool that allows business to take back control of their network with out limiting access.  It is time to break through the walls that have oppressed endusers;  it is time to give freedom back to the enduser; it is time for a prison break!  To start using Clear Blue Security for free (no ads, no upsells), go to and click on the free tab.