Manage Learn to apply best practices and optimize your operations.

Regulatory pressure accompanies changing IT landscape

In this webinar, Henry Svendblad, principal analyst at Nemertes Research Group Inc., explains how the security landscape has developed over the last 15 years. The face of security is transforming, thanks to the virtualization of the enterprise, increased interconnectedness, ongoing threats and regulatory pressure; Svendblad offers some advice for how the enterprise can adapt to these changes.

Virtualization is inevitable. As Svendblad notes, at this point, most people can plug in to a work environment rather than meet at a physical location. Moreover, people are doing this on multiple devices. The fact that a workplace has moved from a single location to multiple devices for each employee is a security risk itself. Monitoring multiple devices for every employee at an organization is a challenge.

The virtualized enterprise is not just about technology, though. Whether you are working at a firm in New York City or on an island, the expectation is that you will be working quickly and with more agility. You have to be able to do work on a range of mobile of devices. Everyone expects a high level of manageability and efficiency. And no one wants to pay extra money for these capabilities.

Check out parts two and three

Read part two for Svendblad's explanation of pervasive protection

Read part three for information on implementing a pervasive protection security plan

Combine this situation with the increased amount of externalized services and you really create significant security challenges. Svendblad says that external services are where data centers use software as a service (SaaS). Nemertes research found that 74% of organizations surveyed are using externalized services. Out of this 74%, each organization uses an average of 6.7 SaaS applications. "Organizations want to integrate," says Svendblad, but issues arise when so many different platforms are sending sensitive information back and forth.

Data can be compromised anywhere, and hackers know this. Over the last several years, there has been what Svendblad calls a hacker revolution. Threats once came from simple viruses on floppy disks; now there are botnets, polymorphic attacks and cyberwarfare. The increase in threats has led to stronger regulations, and continuous monitoring by the National Institute of Standards and Monitoring is only one of the pressures that organizations are dealing with.

Watch Svendblad's video and learn more about the latest threats, regulations and other pressures confronting IT professionals today.

View All Videos

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.