Access "Shoestring security budgets mean innovation and prioritization"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
WHILE WE'RE ALL HAPPY to see 2008 behind us, 2009 could be as challenging as 2008. The new Obama Administration has brought optimism, but businesses have yet to be rewarded with a stable stock market. Intel, for its part, announced layoffs as did Microsoft--the first time in its 30-plus year history. As a result, we are still on shaky, shaky ground. I think it would be safe to say that everyone is going through the exercise of belt tightening. Where can I cut costs? Do I need to make that purchase, or do I simply want that item? The same holds true for security professionals. Budgets are being scrutinized and return on investment is being demanded. So this month's issue is all about getting by on a shoestring budget and comparing yourself to your peers in terms of priorities for the year. In our "Under Pressure" article, Features Editor Marcia Savage dissects our annual Information Security Priorities 2009 survey. Data protection and threat management top the list of priorities. Specifically encryption of all sorts is of keen interest to readers. Regulations... Access >>>
Premium Content for Free.
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
- 10 tips to improve your network security strategy in a recession
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
- Product Review: PGP Endpoint
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
- Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
2013 Security 7 award winners revealed
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Next-generation authentication technologies emerge to restore balance
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization security dynamics get old, changes ahead
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...