This article can also be found in the Premium Editorial Download "Information Security magazine: Keeping on top of risk management and data integrity essentials."
Download it now to read this article plus other related content.
|The Heat Index|
TheInfoPro interviewed 179 Fortune 1000s about their purchasing plans for IT security products and services. These technologies were then ranked by the immediacy of their planned implementation and level of security spending--the higher the score, the higher the priority and the greater spending level. Here are the top 20 technologies for 2005 and how they compare to 2004's rankings:*
NOTE: No score for 2004 means it didn't make the list last year.
But it's more than just regulatory compliance. Many enterprises are pushing their partners and service providers to adopt tighter security controls to both ensure their own compliance and avoid breaches. This is the challenge facing Certegy, a credit and debit card transaction processing firm that must adhere to SOX in addition to the specific security requirements of the 6,000 banks it services worldwide.
"We're responding to customer demand," says Proctor. "For instance, we participate in the Visa network, doing authorization of people's spending limits. Visa has a reputation to uphold; it needs to be secure. And since everything is networked together, it needs to be assured of the security of its partners."
How are enterprises coping with these demands? In a technology survey of Fortune 1000s by Information Security and TheInfoPro, major technology deployments and plans across all industries are focused on infrastructure and management systems--security information management, identity management and enterprise security management systems--as well as internal security infrastructure improvements.
This was first published in April 2005