Access "Big Brother's Watchful Eye"
This article is part of the May 2005 issue of Keeping on top of risk management and data integrity essentials
EXPOSE Our survey finds that enterprises are spending big on management systems to meet regulatory requirements. Top Security Priorities Big Brother is not only watching your security; he is driving the adoption of key technologies that help bring order to the chaos of compliance and management. "Even though it's a hassle keeping up with the regulations, it's really wonderful because I haven't seen a regulation that asked us to do something that we didn't have to do already," says Wayne Proctor, CISO at Certegy. "What's being asked for are things that I've always wanted to get in the program." SOX, GLBA, HIPAA, SB 1386, Basel II and scores more regulations have become integral parts of the security lexicon. Since the inception of SOX, enterprises have been racing to beef up their security to improve corporate governance, ensure the integrity of data and prevent breaches that could result in huge fines and, worst-case scenario, jail time. The Heat Index TheInfoPro interviewed 179 Fortune 1000s about their purchasing plans for IT security products and services... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Desktop Security: GreenBorder Enterprise Security
GreenBorder Technologies' GreenBorder Enterprise Security Solution
-
Snapping on SNMPv3
The ubiquitous management protocol is more secure, but upgrading isn't simple.
-
Hot Pick: Polivec Compliance Management System 3.7
Polivec's Polivec Compliance Management System 3.7
-
Trust Us
It doesn't come easy when you federate identity management.
-
Security Appliance
SonicWALL's PRO 1260
-
Big Brother's Watchful Eye
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
-
Desktop Security: GreenBorder Enterprise Security
-
-
Recent Releases: Security product briefs, May 2005
Read about the information security products released in May 2005.
-
Keeping the Data & Oil Flowing
When ChevronTexaco puts a drill in the ground, it must live with that decision for decades. Risk management and data integrity are essential.
-
Secure Reads: The Art of Computer Virus Research and Defense
Read a review of The Art of Computer Virus Research and Defense.
-
Instant Messaging: Akonix L7 Enterprise 4.0
Akonix Systems' Akonix L7 Enterprise 4.0
-
Access Management
Vernier Networks' EdgeWall 7000 series
-
Recent Releases: Security product briefs, May 2005
-
Columns
-
Layer 8: Debating policy vs. technology
Control Quagmire
-
Logoff: Let's not cheapen information security certifications
Dollars & Certs
-
Perspectives: Windows Server 2003 security stands up
One study concludes that Windows Server 2003 is more secure than Linux.
-
Ping: Bruce Bonsall
MassMutual's Bruce Bonsall
-
Editor's Desk: Targeted malware
Calculating Malware
-
Layer 8: Debating policy vs. technology
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO