Pages

How to Protect Legacy Host Applications?

Many of today’s top enterprises now have advanced infrastructures for IT security.  However, even when many layers of protection are integrated, inadequate security methods can compromise the security of critical data.

However, there are ways to secure legacy host applications.  Modern measures for security typically include encryption when passing through non-secured networks.  These measures also include features like centralized identity management and centralized access control.   There are also access control points where access to resources is audited and monitored.  Further, centralized threat monitoring is employed.  This means that traffic going both in as well as out is scanned for intrusion detection.

If a company has a variety of different applications and servers, it can be difficult for all of the security practices to be adequately monitored and enforced.  That is why modern security architecture is so important.  When a company has a central point of control for handling security, it can be extremely valuable.

Many first-generation legacy hosts used SSL connections that linked the client to the host.  While there was encryption of the data and passwords, this “tunnel” often defeated other security measures.  As a result, it could be difficult to track information passing through the network.
There are other limitations to the SSL architecture as well.  For example, authentication under this strategy tends to be not only weak, but also decentralized.  Unfortunately, short passwords are all that protect many hosts.  Further, these passwords are not even case sensitive.

Additionally, the fact that there is no centralized control over resources also is a major negative.  Another issue is that even unauthenticated traffic manages to pass through to the host.  This factor is due to the encrypted SSL tunnel.  As a result, traffic must be let through even when the client and content are unknown.  The encryption of content offers yet another issue.  Traffic coming in and going out cannot be scanned with devices to monitor security or inspect content.

Attachmate offers a framework that includes centralized management of security.  Traffic that is passing through the host is controlled centrally.  This strategy eliminates potential logistical problems that often come along with security policies being enforced separately through backend hosts.

By Smart 

No comments:

Post a Comment