Follow on Google News News By Tag * Security * Protection * Web * Organisation * Butler * Can * Endpoint * Users * Matrix * Regulatory * More Tags... Industry News News By Location Country(s) Industry News
Follow on Google News | Market Study Just Published: Information Security: Protecting the Business and its InformationNew Software research report from Butler Group is now available from Fast Market Research
Today, information users, and the facilities that organisations make available to them, provide the single largest and least-protected opportunity for data theft and accidental data loss. Poorly managed access controls to corporate systems, lack of regulation over Web usage that allows malicious malware to prosper, and pitifully weak influences over the movement of corporate data between end-user devices, all contribute to operational environments where information assets are being put at risk. Business Issues The everyday use that is made of Web-based access and communications facilities provides universal information accessibility. It has enabled business to cut costs, supported increased operational efficiency, and delivered 24x7 serviceability. However, the growing presence of unregulated Web facilities, including socially driven Web 2.0 usage, is blurring the lines between the core business value of the Web and unacceptable personal use of corporate resources. This is a situation that cannot be allowed to continue unchecked and one where the security team must be allowed to regain control. When considering all the communications and information access channels that are regularly used today, a common theme emerges. E-mail and Webmail, open Web access, the use that is made of video conferencing and electronic meeting rooms, and portal-based personalised access to company data, are all channels that are driven by an ease-of-use demand on business. Usage is quite rightly determined by time-saving efficiency requirements, but also along with these undeniable gains come a range of threats that strike at the sustainability of the business itself. This includes the requirement to properly control access to sensitive data: a position that needs to be emphatically supported in order to avoid fines for regulatory or legal non-compliance, keep away from unwanted publicity and the perception that the organisation cannot be trusted, and also to address brand-value losses that must remain a high business priority. The outward extension of business operations, in order to support collaborative initiatives, adds value to the business efficiency paradigm. A significant part of the associated value-add proposition comes from the facility that each of the participating organisations has to see operational information that is owned by their partners. However, within such relationships each collaborating organisation remains responsible for all of the data that it gathers in and owns. Therefore, regulatory as well as straightforward operational responsibility dictates that security protection must be capable of operating across corporate boundaries. There is no questioning the fact that trading conditions are difficult for all types of organisation, and that there is an obligation to deliver more value while utilising fewer resources. There is little appetite for increasing budgets for additional IT spend across any operational areas, let alone that of security which continues to be seen as a burden rather than as the provider of business continuity, risk management, and regulatory compliance that it should be. As such, a balance between value for money from corporate IT security spend and retaining what many CIOs and Chief Information Security Officers (CISOs) describe as good-enough levels of business protection needs to be achieved. The required goals are to ensure that information- For more information or to purchase this report, go to: - http://www.fastmr.com/ About Fast Market Research Fast Market Research is an online aggregator and distributor of market research and business information. We represent the world's top research publishers and analysts and provide quick and easy access to the best competitive intelligence available. For more information about these or related research reports, please visit our website at http://www.fastmr.com or call us at 1.800.844.8156. End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|