Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Indian outsourcers emphasize cosmetic security measures, Forrester warns

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Editorials & Other Articles Donate to DU
 
OhioChick Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-10-10 12:25 PM
Original message
Indian outsourcers emphasize cosmetic security measures, Forrester warns
U.S. firms urged to push for stronger security from offshore vendors
April 9, 2010

Computerworld - Companies who send software development work to India need to ensure that their vendors take holistic measures to protect data and aren't simply "checking the box" on security issues, Forrester Research warned this week.

Many Indian companies have bolstered their security controls and business continuity measures in recent years, Forrester said in a report. But the lack of executive support for security efforts, an over-reliance on technology controls and inadequate training and awareness undermine the effectiveness of such measures.

"Clients should push their suppliers to invest in people and training, demonstrate C-level commitment, and push government agencies for a better legal framework and judiciary reforms for timely prosecution," the report said.

Forrester analyst Sudhir Apte, who authored the report, said that many of the security measures in place appear designed to appease concerns more than anything else. "What I am seeing is most vendors are checking the box" on technology controls to address security threats and business continuity issues. "They view it as marketing collateral" while pitching their services.

As part of an effort to shore up customer comfort, the Indian government, industry trade association Nasscom and many Indian firms have taken steps to bolster security, Apte noted. For instance, many big Indian vendors have deployed international security standards such as BS 7799, pledged more transparency in their financial reporting standards and ramped up physical security to protect against terrorist disruptions such as the one that hit Mumbai in Dec. 2008. The BS7799 standard specifies a precise set of security controls for IT systems.

More: http://www.computerworld.com/s/article/9175147/Indian_outsourcers_emphasize_cosmetic_security_measures_Forrester_warns
Printer Friendly | Permalink |  | Top
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Sat Apr-10-10 12:29 PM
Response to Original message
1. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
lxlxlxl Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-10-10 12:30 PM
Response to Reply #1
2. this article could be about china or russians in computer science also
have any idea how much of our computer equipment is made in china, or programmed by russians?
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Sat Apr-10-10 12:37 PM
Response to Reply #1
3. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
lxlxlxl Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-10-10 12:53 PM
Response to Reply #3
5. its EVERY time though and ...and i held back =) sorry...
your welcome
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Sat Apr-10-10 12:47 PM
Response to Reply #1
4. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Skittles Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Apr-10-10 11:09 PM
Response to Original message
6. you get what you pay for
Printer Friendly | Permalink |  | Top
 
Grinchie Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Apr-11-10 04:49 AM
Response to Original message
7. Microsft Vista is a good example of "Checking the Box"
While making the operating system totally useless unless you disable all the cosmetic security features.

Trustworthy computing means nothing when you aoutsource the initiative to India, Israel, or Ireland, if they are even on the list anymore.

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 08th 2024, 01:12 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Editorials & Other Articles Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC