PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2006

Perspectives: Midmarket organizations short on security budgets and respect

Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust. While talking to a colleague several weeks ago, I mentioned that I was going to be in New York City for a security conference. I pointed out that I was doing the event "on the cheap" since I had not budgeted for it; I was very proud that I was going to spend a week in Manhattan, attend a conference and only cost my company $300. My colleague replied, "Remember when you could blow $300 on breakfast and no one would notice?" That offhand remark about lush expense accounts really made me think about how my situation had changed. When I started my career, I worked for the Big 6 (now the Big 4) accounting/consulting firms and have since worked for several Fortune 500 infosecurity consulting companies. As a security consultant, I always preached best practices and big-budget solutions. Many of my Fortune 500 clients were readily willing to make whatever changes were necessary to bolster their IT security and comply with government mandates. ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Mining NetFlow

    Your routers and switches can yield a mother lode of security information about your network--if you know where to dig

  • Help From Above

    Security managers are looking to the keepers of the Internet cloud for relief.

  • Secure communications

    by  Dr. Juergen Schneider

    This tip covers ways that you can secure a network to protect data from internal as well as external attacks.

Columns in this issue