Regulatory pressure accompanies changing IT landscape

Regulatory pressure accompanies changing IT landscape

Date: Jul 28, 2014

In this webinar, Henry Svendblad, principal analyst at Nemertes Research Group Inc., explains how the security landscape has developed over the last 15 years. The face of security is transforming, thanks to the virtualization of the enterprise, increased interconnectedness, ongoing threats and regulatory pressure; Svendblad offers some advice for how the enterprise can adapt to these changes.

Virtualization is inevitable. As Svendblad notes, at this point, most people can plug in to a work environment rather than meet at a physical location. Moreover, people are doing this on multiple devices. The fact that a workplace has moved from a single location to multiple devices for each employee is a security risk itself. Monitoring multiple devices for every employee at an organization is a challenge.

The virtualized enterprise is not just about technology, though. Whether you are working at a firm in New York City or on an island, the expectation is that you will be working quickly and with more agility. You have to be able to do work on a range of mobile of devices. Everyone expects a high level of manageability and efficiency. And no one wants to pay extra money for these capabilities.

Check out parts two and three

Read part two for Svendblad's explanation of pervasive protection

Read part three for information on implementing a pervasive protection security plan

Combine this situation with the increased amount of externalized services and you really create significant security challenges. Svendblad says that external services are where data centers use software as a service (SaaS). Nemertes research found that 74% of organizations surveyed are using externalized services. Out of this 74%, each organization uses an average of 6.7 SaaS applications. "Organizations want to integrate," says Svendblad, but issues arise when so many different platforms are sending sensitive information back and forth.

Data can be compromised anywhere, and hackers know this. Over the last several years, there has been what Svendblad calls a hacker revolution. Threats once came from simple viruses on floppy disks; now there are botnets, polymorphic attacks and cyberwarfare. The increase in threats has led to stronger regulations, and continuous monitoring by the National Institute of Standards and Monitoring is only one of the pressures that organizations are dealing with.

Watch Svendblad's video and learn more about the latest threats, regulations and other pressures confronting IT professionals today.

More on Network Security Best Practices and Products

  • canderson

    Implementing a new security management plan

    VIDEO - To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
  • canderson

    Pervasive protection is the new security paradigm

    VIDEO - Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.
  • canderson

    How to find the next-gen firewall your network security needs

    VIDEO - Odds are your network needs an NGFW, but first you need to know what it does, where it fits and what questions to ask vendors.
  • User activity monitoring is just as critical as asset monitoring

    News - User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.

    ( Nov 26, 2014 )

  • firewall

    Definition - A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.
  • Information security services under siege

    Opinion - Security professionals are disillusioned and desperate for some progress in the uphill battle against attackers. Is the security industry up for the task?
  • Fortinet, SonicWall release new enterprise firewalls

    News - New enterprise firewalls from Fortinet and SonicWall offer carrier-class speeds and feeds at a nice price.

    ( Oct 30, 2014 )

  • IBM not in financial crisis

    News - SN blogs: This week, one analyst discusses the importance of incident detection and response; another speculates on the benefits of SDN and DevOps.

    ( Oct 24, 2014 )

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: