Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2008

GRC: Over-Hyped or Legit?

GRC: Over-Hyped or Legit? While governance, risk and compliance tools over-promise, organizations need to streamline and break away from their siloed approaches. One of the most hyped terms today is GRC or governance, risk and compliance. It is being used as a catch-all phrase for most information security strategies and tagged onto various products, adding even more confusion in the market as to what it truly means or promises to corporations. First and foremost, GRC, or GRC "tools," is not a new market or technology category a la IPS or SIM or IAM. Unfortunately today there are technology solutions that claim to be turnkey GRC solutions with others taking existing technology and positioning them as a GRC fix. Not surprisingly the products' capabilities don't truly deliver on helping an organization create and track its GRC strategy. Rather, GRC is a process that includes three distinct (IT governance, risk management and compliance) but related activities intended to solve different problems for different stakeholders within ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product Review: Workshare Protect Premium 6.0

    Workshare Protect Premium 6.0 seeks to eliminate the malicious or accidental leakage of sensitive corporate data.

  • Security Services: Symantec Online Fraud Protection

    Symantec's Online Fraud Protection service includes an initial on-site assessment, phishing and transaction monitoring, incident response, monitoring of malware targeting the company's brand and analysis of new malware behavior.

  • Product review: AirDefense Enterprise 7.3

    AirDefense's AirDefense Enterprise 7.3, a wireless intrusion detection and intrusion prevention tool, has new features including support for Power over Ethernet (PoE) for its sensors, a new user interface, overhauled reporting and new features such as WEP cloaking, advanced forensics, spectrum analysis and a centralized console to manage appliances.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close