Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Top forensics tools for tracking down cybercriminals."

Download it now to read this article plus other related content.

Who's On First?
Infrastructure complexity spawned concern among respon- dents in several areas, notably identity, access and vulnerability management, and reporting mechanisms.

Where's Your Money Going?

More widely distributed systems and the increasing volume of end points has many security managers crying out for automated directory services,

    Requires Free Membership to View

and password and provisioning management technologies.

Some managers are reticent to dive into expensive identity management systems until the industry settles on implementation standards. "Like most organizations, we don't want to commit to a vendor-specific approach that will constrain our ability to deliver flexible solutions in the future," says Jon Stanford, chief security officer for the American Criminal Investigators Network.

Meanwhile, access control technologies like two-factor authentication and enterprise single sign-on remain a wait-and-see proposition in most organizations. A quarter of the survey respondents said they'd be spending more on both technologies in 2006, but some, like Stanford, are still cautious of hidden costs, like the replacement of lost tokens.

While most organizations have their patching processes down pat thanks to automated tools and scheduled patch-release cycles from Microsoft and Oracle, vulnerability management remains a top operational priority. Spending on network vulnerability scanners and patch management tools is expected to rise. Security managers also want to improve the integration of vulnerability, patch and configuration management tools into a single console. Spending is expected to head upward there as well.

This was first published in December 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: