Gartner Blog Network

Posts from Date:   2010-3

Can you trust your employees?

by Jay Heiser  |  March 19, 2010

Lately, we’ve been having some discussions about what to do with privileged users, and how to protect your organization from hostile administrators. Ant Allan, Andrew Walls and I have just collected a lot of this material into a new research note. Ultimately, there‚Äôs only so much you can do. If you hire crooks, or if […]

Read more »

Are you being cross-notified?

by Jay Heiser  |  March 19, 2010

I’ve recently become aware of several incidents of client data being lost because their service provider administrators had managed to infect their administrative workstations with malware. If your service provider were to suffer an embarassing failure like that, would they tell you? Before allowing an outsider to have privileged access to any of your systems, […]

Read more »

A strainer makes a lousy bottle

by Jay Heiser  |  March 12, 2010

I don’t know why certain topics come in waves. I’ve had three questions so far this week on the topic of using email for sensitive data. Internet email was designed back in the day when the Internet was smaller than any of today’s enterprises. SMTP is an insecure protocol that transfers email messages in clear […]

Read more »

How Much Should We Know About the Lives of Others?

by Jay Heiser  |  March 3, 2010

By Jay Heiser and Carsten Casper, with Terry Allan Hicks A new court ruling on data retention practices in Germany is getting a lot of attention from the media, and from some Gartner clients. On Tuesday, 2 March, the German Federal Constitutional Court overturned a three-year-old law that required telecommunications providers and Internet service providers […]

Read more »