dcsimg
 

Desktop Search Demystified

By CIOinsight  |  Posted 01-05-2005 Print

WEBINAR:
On-Demand

EUC with HCI: Why It Matters


There's been a lot of talk lately over new desktop search tools and the risk they pose to the enterprise.

There's been a lot of talk lately over new desktop search tools and the risk they pose to the enterprise. The worry is that while these nifty little apps—such as Google Desktop Search and a host of other similar programs—can help you find that long-lost e-mail or proposal draft you've been searching for, they can also reveal data you might not want discovered, such as confidential memos or personal files. The search engine will locally cache content viewed by a PC, which can be accessed by another user of the same PC, or even by Internet hackers who gain electronic access to the PC. Because of this, some analysts warn companies to restrict these programs from being installed, especially if the computers are shared among different employees.

But the security threat is not caused by the search tools themselves—which have been downloaded by the thousands, often under the radar of the CIO. In fact, desktop search tools do not cause any security vulnerabilities whatsoever, says security expert Bruce Schneier, founder and CTO of Counterpane Internet Security Inc. Rather, "They tell you about vulnerabilities you already have," he says. "Desktop search programs don't magically make files findable. All they're doing is searching, which is exactly what they're supposed to do."



 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit