Feeds

IT security to go offshore. Maybe

Nothing is sacred

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Infosecurity Europe 2004 IT security - once the most closely-guarded IT function - could become the next candidate for offshoring.

As the security market has evolved, more companies have outsourced functions like security monitoring and response. Tight corporate budgets and a skills shortage of suitably qualified security professionals have accelerated this trend.

According to the Yankee Group, managed security services revenue is set to grow from $1.5bn in 2002 to $3.7bn in 2008.

Maria Cirino, a SVP at VeriSign and head of its managed security service business, explained that the market started with mid-range companies outsourcing the management of their security infrastructures has now developed to embrace larger corporates. A swathe of corporate governance regulations, such as Basel II banking regulations and the US Sarbanes-Oxley Act on accounting, recently came into force. Cirino reckons outsourcing security helps companies to comply these regulations.

Like most segments of the IT market, managed security service providers are beginning to consider using low-cost labour markets.

Although VeriSign wants to retain the most critical aspects of its service - such as security monitoring - Cirino said it would consider handing over responsibility for less critical functions (such as provisioning equipment) to sub-contractors in the third world. VeriSign - like other vendors - have made no firm plans. "The jury is out on offshoring. Within the next 18 to 36 we'll have an answer on whether the managed security market will embrace offshoring," Cirino told El Reg. ®

Related stories

Indian call centres pose security risk
Shell's IT department off to India
Offshore IT jobs = higher employment

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.