Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IT Pros Tackle Complex Homeland Security Scenarios: Page 3 of 3

Keeping the noise down also is key. Using technology that assesses whether a security alert or alarm is a critical threat to a network can help companies avoid "security information overload," said Sheri Mason, director of marketing at CA.

"Systems can generate one, five, 10 million security events a day. So we don't need security technology that creates events. We need technology that reduces them," Mason said. "Otherwise, we're running after false alarms and possibly missing real ones."

Mike Furey, special assistant to the associate lab director at Brookhaven National Laboratory, Upton, N.Y., illustrated the sobering reality of the current geopolitical climate. "We are now testing radiation sources in moving vehicles to see the limits of current technology, and the makers of that technology need to raise the bar," Furey said.

But CA's Cunniffe best explained the sound logic of simplicity in IT security. "Every person is generally involved with homeland security because our companies are the backbone of the overall economy," she said. "Nobody owns the Internet, but if everyone protected their assets, we'd be closer to the ultimate goal."