MasterAdkins: There is so much wrong with that article I don't know where to start.
SacriliciousBeerSwiller: Yay. More ways for the IT department to get in the way of productivity./it's possible to provide security without f*cking over the entire user base//95% of IT "professionals" don't understand how to do this
H31N0US: What is the difference between a firewall and a router?Price.
symbolset: Firewalls are straight BS. The only reason for a hardware firewall is because your hosts are accepting untrusted connections in the first place when they should not, and not validating their inputs - which means you fail IT. The network is not trusted. One compromised host inside your firewall and you're PWN3D.For an added bonus, hardware firewalls are hosts and can be compromised too.
ProfessorOhki: BumpInTheNight: All fine and dandy until one of them unloads a rootkit onto the VM they're sitting on that burrows into the hypervisor and sets up shop.Sure, that's a risk. But if a piece of malware can get through the OS on a VM IT created and maintains, then break out of the virtualization environment (which is current and patched) and THEN install itself into machine running the hypervisor (which is current and patched)...I can't help but think you wouldn't have had much better luck with company-mandated workstations in the same situation. Because at part one of "rootkit" it would have compromised any given machine in your network and happily spread itself to all the others. Which is more trustworthy? Your network gear at catching infections as they travel the LAN, or a hypervisor at maintaining isolation? I honestly don't know; I'm not an IT guy.I'm just saying that BYOD doesn't necessarily imply BYO OS and software.
BumpInTheNight: All fine and dandy until one of them unloads a rootkit onto the VM they're sitting on that burrows into the hypervisor and sets up shop.
socodog: BYOD sounds great in a perfect world, but all of those devices have to be patched, managed, secured, etc. So what happens if you're a developer at Widget corp and your machine is comprimised because it's YOUR machine and is thusly not set up securely? IP gets sucked away. Corporate secrets get stolen and worse. Also, are you going to pay to train your IT drones to service EVERY SINGLE piece of gear that comes in? They generally don't have time to dick around with every type of hardware out there to learn it enough to properly support you. When you or your kid or whatever fark up that shiny new tablet you picked up at Microcenter, you're not going to take it to them to have it worked on. Or worse, you just might.
socodog: Have fun hanging out at the "genius bar" mcallcl. ha!Sorry you've had bad experiences with IT. I got out of that end of shiat a LOOOONG time ago for the reasons you listed above.I don't deal with end users anymore and it's great. I just simply don't care to remove the farked up spyware your 10 year old installed on your company owned laptop YET AGAIN.BYOD sounds great in a perfect world, but all of those devices have to be patched, managed, secured, etc. So what happens if you're a developer at Widget corp and your machine is comprimised because it's YOUR machine and is thusly not set up securely? IP gets sucked away. Corporate secrets get stolen and worse. Also, are you going to pay to train your IT drones to service EVERY SINGLE piece of gear that comes in? They generally don't have time to dick around with every type of hardware out there to learn it enough to properly support you. When you or your kid or whatever fark up that shiny new tablet you picked up at Microcenter, you're not going to take it to them to have it worked on. Or worse, you just might.No. Just go through the proper channels and do it right. If your request is actually valid, businesswise, your manager should have no issue getting it pushed through.What do I know, though? I've only been at this about 21 years. Funny, how regardless of how much House MD you've watched you don't try to tell an ER doctor how to do his job. You've seen Home Improvement but are you trying to tell the electrician that comes to fix stuff at your house how to do his job?
socodog: Being old school and really deep in large scale networking still, I have to come out squarely AGAINST cloud initiative.Cisco is trying to cram it down everybody's throat because it's going to take quite a bit of hardware upgrades to make it worth a shiat.At the end of they day, though, you're taking the keys to your kingdom, all your eggs, the baby, the bathwater, and your girlfriend's diaphragm and putting it in a box to send down the road to a 3rd party. You have an SLA with them and that's all cool, but an SLA won't stop things like an a-hole with a digger cutting the fiber to their facility or yours. An SLA won't stop rogue administrators from digging around unbeknownst to you. An SLA won't get all of your mission critical data back to your widget makers so you can keep making that all important cash.
friday13: Oh I believe you.....exucse me while I get some mead to drown the memories./and it's only 1PM...how much worse can it get...?
ProfessorOhki: "Yesterday, I saw a guy trying to air up his own tires! Ahaha, can you believe it? He wasn't even an expert!"
pudding7: ZAZ: I remember way back when we didn't have firewalls. NAT hadn't been invented because addresses were abundant and free for the taking. The box on my desk was visible to the world.At my office, I just give all our servers and desktops a public IP and skip the whole internal/external network thing. It's easier for everyone. I also just gave everyone Admin rights to their own systems. Talk about a time saver for my desktop support guys. Now the users can install anything they want. Just skip the middleman, you know?
KoolerThanJesus: I have to go with MasterAdkins on this one. This article was pretty much a waste.
Want more stories with less ads? Try
It's what the cool kids are doing.It's also how we pay the bills.
Sign up for the Fark NotNewsletter!
Links are submitted by members of the Fark community.
When community members submit a link, they also write a custom headline for the story.
Other Farkers comment on the links. This is the number of comments. Click here to read them.
You need to create an account to submit links or post comments.
Click here to submit a link.
Also on Fark
Submit a Link »
Copyright © 1999 - 2017 Fark, Inc | Last updated: Oct 21 2017 20:07:56
Runtime: 0.235 sec (235 ms)