Video Screencast Help
Security Community Blog

Process Orchestration – The Key to Improving Security Response

Created: 08 Jun 2011 • 2 comments
Sean Yarger's picture
+1 1 Vote
Login to vote

 

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

 

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

 

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process – and costing you and your company valuable time, money and possibly confidential information.

 

The key to managing this complicated process is automation. By shifting and automating the process of security management, a laptop owner can simply input information into an online form – automatically setting off the necessary chain of events. As you decide to use process orchestration, I would like to suggest a few pointers:

 

  • When you decide which process to automate first, start with one that is highly visible or involves too many employees.
  • Look into tools that will help you facilitate workflow, and be sure to choose one that is open and can link to other systems.
  • Assign an owner to each process. Investigate the ins and outs of the process itself, and be sure to keep flexibility in mind.
  • Test the process in chunks – start by piloting pieces of the process on smaller groups of people.
  • Once automation is up and running, measure and evaluate the results to make sure it is a well-oiled machine.

 

As busy as IT staff can get, it is worth the time to set up the right automation tools and start reengineering your processes. Security will improve and your employees will thank you – making the next lost-laptop incident a whole lot simpler for everyone.

For more information, check out my article on Information Management.

Example Lost Asset process

Comments 2 CommentsJump to latest comment

Juliann's picture

Hi Sean,

I totally agree with you that it is important to monitor your processes to prevent dowtime losses.

I recently came across a global website and server monitoring company. their monitoring services include- website, server, network monitoring - helping reduce the downtime losses 24x7.

More over, they are offering free services in the beta phase. You can have a look to know more

https://www.monitorscout.com/

 

-2
Login to vote
TelmarWorldWide's picture

I totally agree with you. It is important to monitor your processes to prevent dowtime losses.

For more information Visit  http://www.telmar.com

 

-4
Login to vote