Application security has become a major challenge in recent years and it’s up to businesses to rethink how they approach this issue to protect their information from unauthorized individuals.
Read through your favorite news site and you’ll probably see at least one story about some sort of cybercrime. Whether it’s stolen credit card numbers, compromised customer data or distributed denial of service attacks, today’s businesses are under attack from every possible direction.
Simultaneously, companies need to assess compliance risk. As an example, the General Data Protection Regulation (GDPR), effective May 2018, combines numerous smaller European privacy laws under one umbrella and requires any company that does business in Europe to inform customers if they have had a breach of personal information or face severe penalties. This makes investing in proper security controls the obvious strategy for compliance instead of paying fines, since fines could be huge.
To make matters worse, businesses can only devote so much to their security—they have other priorities that must be attended to, whether it’s customer service or product research and development. Yet cybercriminals are only getting better at their jobs. Not too long ago, there was a story about a major oil company that was compromised when hackers planted malware in the online menu of a restaurant that employees frequently ordered from. In a twisted way, their ingenuity and tenacity is almost admirable.
That said, businesses can maximize their security and regain their peace of mind, they just need to take a more thoughtful approach. Many businesses struggle with this—they spread themselves thin and misjudge where their focus should be. The common security analogy is using $10 locks to protect a $1m asset and vice versa, using $1m locks to protect a $10 asset.
The key is seeking outside expertise both in terms of devising a security strategy and deploying solutions and tools that have strong security features from the get-go. If cybercriminals are devoting their every waking moment to cracking a company’s security, working with security experts and deploying the right technologies can help enterprises tip the scales back in their favor—without having to be security experts themselves.
As a software developer, Progress understands the importance of security—especially in the modern digital business landscape, where so much of a company’s operations go through various applications and devices. That’s why we are constantly updating our various tools and technology in response to rising security needs.
For example, Progress OpenEdge 11.7—our latest release—features the OpenEdge Authentication Gateway, which is essentially a security token service (STS). By taking these steps, we help our users secure their applications and ensure the right users have access to the right information.
We recently had the opportunity to speak with SD Times in more depth about application security and some of the approaches we offer to addressing this challenge. Feel free to check out the article and let us know in the comments if you have any questions.
Tanya O’Connor is the product marketing manager for Progress OpenEdge. She has over 15+ years of marketing strategy, channel and communications experience in the application development market.
Subscribe to get all the news, info and tutorials you need to build better business apps and sites
You have the right to request deletion of your Personal Information at any time.
You can also ask us not to pass your Personal Information to third parties here: Do Not Sell My Info
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Copyright © 2021 Progress Software Corporation and/or its subsidiaries or affiliates.All Rights Reserved.
Progress, Telerik, Ipswitch, Chef and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings.