Tip

Future watch -- Hot security technologies and emerging trends in 2006

Pete Lindstrom, research director of Spire Security, presented this sessionat Information Security Decisions Fall 2005.

    Requires Free Membership to View


Security managers are clearly being pulled in a few different directions. On the one hand, you're trying to meet strategic demands, such as complying with regulations, quantifying ROI and managing risk. On the other, you've got to protect against perennial threats, including fending off viruses and worms, and hardening the perimeter against external attacks. Technology's goal is often to automate as many of these duties as possible in order to enable you and your security team to tackle these more strategic imperatives.

This presentation helps you understand the evolution of the security vendor landscape with an eye toward promising security techniques and technologies for 2006. No one has his finger on the pulse of the security market like Pete Lindstrom, research director at Spire Security. In this presentation, Lindstrom investigates the latest academic research, information security best

MORE INFORMATION

Joel Snyder forecasts the future of the e-mail security market

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

practices and upcoming product releases. You gain a sense of how best to spend next year's security budget.

Plan ahead for investing your smartest security budget in 2006 as Lindstrom delivers:

  • A survey of existing tools and techniques
  • New methods for combating threats, such as employing enclaves and virtualization
  • Noteworthy enhancements to commonly used tools, including dynamic access control, honeypots and threat correlation
  • New ideas for solving old problems like the use of context-based encryption and unified threat management
  • A way to separate worthwhile approaches from vendor hype

Download this presentation


This was first published in October 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.