Regulatory pressure accompanies changing IT landscape

Regulatory pressure accompanies changing IT landscape

Date: Jul 28, 2014

In this webinar, Henry Svendblad, principal analyst at Nemertes Research Group Inc., explains how the security landscape has developed over the last 15 years. The face of security is transforming, thanks to the virtualization of the enterprise, increased interconnectedness, ongoing threats and regulatory pressure; Svendblad offers some advice for how the enterprise can adapt to these changes.

Virtualization is inevitable. As Svendblad notes, at this point, most people can plug in to a work environment rather than meet at a physical location. Moreover, people are doing this on multiple devices. The fact that a workplace has moved from a single location to multiple devices for each employee is a security risk itself. Monitoring multiple devices for every employee at an organization is a challenge.

The virtualized enterprise is not just about technology, though. Whether you are working at a firm in New York City or on an island, the expectation is that you will be working quickly and with more agility. You have to be able to do work on a range of mobile of devices. Everyone expects a high level of manageability and efficiency. And no one wants to pay extra money for these capabilities.

Check out parts two and three

Read part two for Svendblad's explanation of pervasive protection

Read part three for information on implementing a pervasive protection security plan

Combine this situation with the increased amount of externalized services and you really create significant security challenges. Svendblad says that external services are where data centers use software as a service (SaaS). Nemertes research found that 74% of organizations surveyed are using externalized services. Out of this 74%, each organization uses an average of 6.7 SaaS applications. "Organizations want to integrate," says Svendblad, but issues arise when so many different platforms are sending sensitive information back and forth.

Data can be compromised anywhere, and hackers know this. Over the last several years, there has been what Svendblad calls a hacker revolution. Threats once came from simple viruses on floppy disks; now there are botnets, polymorphic attacks and cyberwarfare. The increase in threats has led to stronger regulations, and continuous monitoring by the National Institute of Standards and Monitoring is only one of the pressures that organizations are dealing with.

Watch Svendblad's video and learn more about the latest threats, regulations and other pressures confronting IT professionals today.

More on Network Security Best Practices and Products

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: