IT Security: Playing To Win

Security company <a href="http://www.fortifysoftware.com/">Fortify Software</a> today released a Flash-based game called <a href="http://www.fortifysoftware.com/games/itdefender.jsp">IT Defender</a> that attempts to educate players about workplace security risks while they risk their jobs by playing a game at work.

Thomas Claburn, Editor at Large, Enterprise Mobility

April 11, 2006

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Security company Fortify Software today released a Flash-based game called IT Defender that attempts to educate players about workplace security risks while they risk their jobs by playing a game at work.

Sure, it's a PR ploy. But it's a good one. (Really, anything is better than another press release.) As a game, it's nothing groundbreaking, but it's nicely done for what it is.The premise is simple: You have to run around a Pacman-inspired office maze to stop colleagues from creating security breaches. To complicate matters, your boss is chasing you around, trying to drag you into a meeting, and you need periodic coffee breaks to sustain your speed.

In other words, it's frighteningly realistic.

Read more about:

2006

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights