Browse by year:
April - 2008 - issue > CEO Spot Light
Make your product secure before you release or deploy it
si Team
Wednesday, April 2, 2008
Traditionally, the security trend has been reactive. Typically, after a product or major software system has been released and deployed engineers figure out that the product may be vulnerable to attacks. In the last several years, lots of money has been spent on to avoid some of the known problems and make the product secure after the product is released or deployed.

However, the trend is shifting rapidly. The new age product development process now will involve security aspects to be included during the product design and development stage itself. For this to happen, care should be taken to build the product in such a manner that the products remain safe not only from known threats, but also from unknown threats both at the application and at the protocol level. The real dollar costs and reputation risks associated with system patching, product recall, service downtime and data corruption are significant when it comes to networks, wireless, and storage systems. Preemptive security and robustness testing offsets these risks. Fundamentally you need to change the way you are building or rolling out products and deploying it at the enterprise.

The hackers' community has become very sophisticated and threats have increased drastically. Attacks are much more advanced and vulnerability to hackers' attacks is now been extended to even wireless infrastructures, let alone network infrastructure. Consequently, along with the network infrastructure, digital media, wireless infrastructure and mobile systems are also equally susceptible to assails nowadays. So, it is crucial to take the proactive measures and preemptively tackle the new age avatars of threats.

Miscreants can jeopardize even the wireless system and take control or steal any information flowing through wireless infrastructures such as wi-fi, wi-max and Bluetooth without much sweat if there are no proactive and preventive measures to deal with the attacks. You don't even know where the attacks are coming from to take control of your network. So, it is mandatory to look for possible security holes and cover it during the product development stage as well as during the deployment stage before it is too late!
Share on LinkedIn