Recently released market study: Security management fundamentals

Recently published research from Ovum, "Security management fundamentals", is now available at Fast Market Research
 
Aug. 10, 2010 - PRLog -- The industry has approached the development of security management products in a "bottom-up" direction, providing key components of the security management functionality wherever this has been technically feasible. Vendors have focused on supporting management approaches with a significant following. For example, ITIL, COBIT, and ISO 27000 have provided focal points around which management products have clustered. Organizations should evaluate components that will deliver a significant return on investment (ROI) in their environments while providing a platform for the development of a more comprehensive security management environment.

Products in the security management category can deliver business benefits in the following areas:

They can provide the evidence to satisfy audit and compliance requirements, which in some business situations are mandatory obligations. In other situations, the information may be useful to reassure business partners and customers about the security of their intellectual property.
They can improve the effectiveness of the organization's security efforts.
They can enable better security alignment of resources to the risks the organization faces, and therefore a better return on investment.
These benefits depend on the organization using the information that the tools provide. The task of converting the information provided by the tools into actions is not trivial. Management tools in general tend towards generating too much information and obscuring the key messages under a mountain of less important data. Therefore, tools should be judged by the extent to which they filter information and allow tailoring of alerts to business priorities. When interfacing with risk management activities, the main difficulty is in determining reliable quantitative information about risks. Business benefits depend on the relevance of the information obtained and the use that is made of it.

In the field of patch management, management products have to integrate with the patch delivery services of several application and platform vendors. These vendor patches may adversely impact larger organizations with more customized IT deployments if the patch conflicts with a customization that the organization has applied to the application. Organizations therefore try to apply patches in a periodic rollout strategy and test each group of updates before they are deployed. The security management tools then have to be integrated with the organization's testing tools and processes.

Each of the regulations that impact businesses require organizations to deploy multiple security "controls" over their systems and processes. Every organization is subject to many laws and regulations. Fortunately, the same controls feature in multiple laws and regulatory regimes. Some security management tools help users rationalize these activities and avoid duplicating reports or controls.

Generally, the benefits of security management increase with the size of the organization. The need to use automated tools to collate, rationalize, and assimilate information from diverse sources increases with the size of the operation

For more information or to purchase this report, go to:
-  http://www.fastmr.com/prod/72701_security_management_fund...

Report Table of Contents:

SUMMARY
Impact
Ovum view
Key messages
Definition
BUSINESS IMPACT
Putting security into a business context
Integrating security management with compliance management
Converging security management with systems management
Converging information security and physical security management
Converging security management and application development
SELECTION CRITERIA
Security management is a process that requires support
How to group security management functionality
Managing past, present, and future aspects
RATIONALIZING PRODUCTS AND SUPPLIERS
Overview
Functionality
Risk management
Configuration and patch management
Security information and event management
Logging and reporting
Architecture
SOLUTION MATURITY
Security management has taken a central role within IT security suites
Security management deployment is low risk
DEPLOYMENT AND MANAGEMENT CONSIDERATIONS
Regulated industries have the most need for security management
The business view of IT security
Systems integrators have a role in deploying security management
External security management services
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology

List of Figures
Figure 1: Security management interactions

About Ovum

Ovum fully understands convergence across telecoms, IT services and software. They invest heavily in researching what is happening in a market that is dynamic and full of risk and reward, analysing the changes and identify the threats and opportunities ahead for their clients. Ovum's team has extensive experience in the sector and is dedicated to 'getting closer' - to the industries they advise on, to the people they work for, and ultimately to the real issues determining how ICT markets behave. Ovum maintains a fluid, highly collaborative structure that brings the right range of expertise to each situation.  View more research from Ovum at http://www.fastmr.com/catalog/publishers.aspx?pubid=1006

About Fast Market Research

Fast Market Research is an online aggregator and distributor of market research and business information. We represent the world's top research publishers and analysts and provide quick and easy access to the best competitive intelligence available.

For more information about these or related research reports, please visit our website at http://www.fastmr.com or call us at 1.800.844.8156.

# # #

Fast Market Research is an online aggregator and distributor of market research and business information. We represent the world's top research publishers and analysts and provide quick and easy access to the best competitive intelligence available.
End
Source: » Follow
Email:***@fastmr.com Email Verified
Zip:01267
Tags:Security, Tools, Patch, Can, Benefits, Converging, Functionality, Application, Recommendations, Rationalize
Industry:Business, Research, Marketing
Location:Massachusetts - United States
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Fast Market Research PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share