Cloakware Outlines Top Five Information Security Challenges for US Government Agencies

March 3, 2009

Protecting Privileged Access and Critical Systems Underscore Threats Facing Federal Entities

VIENNA, Va. , March 3 /PRNewswire/ -- Cloakware Inc., the provider of proven software solutions for securing mission-critical assets, today identified the top five challenges facing federal agencies that expose them to critical security breaches. The list, compiled from in-depth conversations with industry experts and government agencies, outlines the most significant challenges facing federal organizations concerned with protecting the systems that support critical infrastructure (cyber CIP) while providing an operationally efficient environment.

With continuing reports of major security breaches and thwarted attacks at both government agencies and Fortune 2000 organizations, cyber security has never been a greater priority. Though confronting short-term economic and national defense concerns, newly elected President Obama has also ordered a 60-day review of the U.S. information security and cyber CIP policy. This call to action recognizes that a failure to implement proper security measures can facilitate internal and external threats to the confidentiality, integrity and availability of the nation's critical infrastructure.

In January 2009 , the U.S. Government Accountability Office (GAO) published an update to the High-Risk Series (GAO-09-271) report outlining federal information and cyber CIP concerns. The report stated that protecting the federal government's information systems and the nation's critical infrastructure is a top-line challenge. It requires resolving identified deficiencies and fully implementing effective security programs.

In a concerted effort to comply with pending mandates from the new administration, Cloakware recognizes that government entities will be expected to implement solutions that address the following top cyber security challenges:

1. Cyber security as top-level priority - Earning cross-agency buy-in is critical for managing threats effectively, ensuring centralized and controlled access to vital information and systems. 2. Establishing and implementing consistent security initiatives - Mandating policies can be a complex and daunting task, but with insufficient processes in place to enable full accountability, agencies become susceptible to internal and external threats. 3. Preventing system disruption - Dynamic and complex technology environments, including virtualized, cloud computing or service-oriented infrastructures, make managing information access extremely difficult, requiring flexible controls and solutions to adapt and prevent interruptions - or worse. 4. Improving warning capabilities - Access to critical information assets must be monitored and managed intensively in all facets of the organization. Implementing proactive warning systems can circumvent critical incidents, limiting exposure to agency credentials and vital information that opens the agency to extreme governance risks both inside and outside its walls. 5. Strengthening incident recovery - While mitigating occurrences is the first line of defense, the ability to recover from incidents quickly without exposing critical information and access needs to be improved upon. When events do arise, privileged information and access are compromised without a disaster recovery plan in place.

"Government agencies, above all else, must be unfailingly vigilant in trusting secure information to internal and external forces," said David Canellos , president and chief operating officer, Cloakware. "If exposed to the wrong user, the information controlled by these agencies can endanger the public well-being financially, legally or even physically. Cloakware's Password Management product helps these agencies take the necessary steps to meet these challenges, positioning them for better governance, less risk and greater compliance. This ultimately serves to protect the public's trust and maintain national security initiatives."

About Cloakware

Cloakware, provides innovative, secure, proven software technology solutions that enable customers to protect business and digital assets in enterprise, consumer and government markets. Cloakware's two main product lines include Cloakware Datacenter Solutions, which help organizations meet governance, risk management and compliance (GRC) objectives for privileged password management while ensuring business continuity and the security of mission-critical data and IT infrastructure. Cloakware Consumer Product Solutions protect software and content on PCs, set-top boxes, mobile phones and media players. Protecting more than one billion deployed applications, Cloakware is the security cornerstone of many of the world's largest, most recognizable and technologically advanced companies. Headquartered in Vienna, VA and Ottawa, Canada , Cloakware has regional sales offices worldwide. www.cloakware.com

Media Contacts: Kate Reed Articulate Communications Inc. +1 212.255.0080, ext. 12 [email protected] Lisa Spencer Cloakware Inc. +1 866.465.4517, ext. 277 [email protected]

SOURCE Cloakware Inc.

Copyright © 2008 PR Newswire Association LLC. All Rights Reserved.