Future watch -- Hot security technologies and emerging trends in 2006

This presentation helps you understand the evolution of the security vendor landscape with an eye toward promising security techniques and technologies for 2006.

Pete Lindstrom, research director of Spire Security, presented this sessionat Information Security Decisions Fall

2005.


Security managers are clearly being pulled in a few different directions. On the one hand, you're trying to meet strategic demands, such as complying with regulations, quantifying ROI and managing risk. On the other, you've got to protect against perennial threats, including fending off viruses and worms, and hardening the perimeter against external attacks. Technology's goal is often to automate as many of these duties as possible in order to enable you and your security team to tackle these more strategic imperatives.

This presentation helps you understand the evolution of the security vendor landscape with an eye toward promising security techniques and technologies for 2006. No one has his finger on the pulse of the security market like Pete Lindstrom, research director at Spire Security. In this presentation, Lindstrom investigates the latest academic research, information security best

MORE INFORMATION

Joel Snyder forecasts the future of the e-mail security market

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

practices and upcoming product releases. You gain a sense of how best to spend next year's security budget.

Plan ahead for investing your smartest security budget in 2006 as Lindstrom delivers:

  • A survey of existing tools and techniques
  • New methods for combating threats, such as employing enclaves and virtualization
  • Noteworthy enhancements to commonly used tools, including dynamic access control, honeypots and threat correlation
  • New ideas for solving old problems like the use of context-based encryption and unified threat management
  • A way to separate worthwhile approaches from vendor hype

Download this presentation


This was first published in October 2005

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close