EMC hit by security lapse

EMC fails the 'practice what you preach' test despite buying top security firm

At the EMC European Momentum conference the company's executive vice president Dave DeWalt admitted that the firm's security is less than perfect.

In his Keynote speech to 1200 delegates DeWalt first explained that EMC had "over 10,000 attacks on their web site every month" and so they had got in a company to test their security. DeWalt was surprised when "less than 24 hours later I had pictures of my desktop and applications."

Advertisement - Article continues below

It's unlikely that he was referring to actual photographs, it's more likely that the security company provided him with screenshots of his desktop and applications, and hence had cracked their internal network security.

While it's routine for big companies to get in specialists to investigate their security on a regular basis, most of those companies are not the owners of security specialists RSA.

Back in July EMC paid around $2.1 billion dollars for RSA and at the time EMC CEO Joe Tucci said "Businesses can't secure what they don't manage, and when it comes to securing information, that means simply two things - managing the data and managing access to the data,"

He added "Bringing RSA into the fold provides EMC with industry-leading identity and access management technologies and best-in-class encryption and key management software to help EMC deliver information lifecycle management securely."

EMC prides itself on its speed assimilating companies; it has bought 10 this year. - But from this admission it's obvious that they've not quite managed to integrate RSA into their company's security systems.While a lack of security on EMC's internal network doesn't indicate that any of EMC's own products are lacking in security, it does pose some questions. Why doesn't a company that boasts a research and development spend of $4 billion over the last three years spend more on protecting their own network? And how long is it going to be before RSA is included in their products?

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/cloud/355098/ibm-dedicates-supercomputing-power-to-coronavirus-researchers
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020