Feeds

IT managers prescribe holistic security

But don't swallow own medicine

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Reg Reader Studies A Quocirca Reg Reader Study has found that while an overwhelming majority of IT managers believe that security measures should be managed centrally, just over half have actually begun to implement such a policy, and a paltry 18 per cent have actually completed deployment.

Quocirca's research - sponsored by Computer Associates - contains input from 1,200 IT managers from Europe and North America. It concludes that 60 per cent of businesses continues to manage point solutions individually, even though only one third of those surveyed think that this is the most effective solution. Quocirca principal analyst Jon Collins notes: "This suggests that tactical solutions are distracting companies from the real challenge, of defining and deploying a corporate security policy that takes a holistic view of the business risks and enables the implementation of comprehensive solutions."

The implications of not giving your firm a dose of holistic security medicine are clear, as Computer Associates' Simon Perry says: "At a time when Trojans, worms and viruses are constantly evolving and blending to create new security threats, IT managers cannot afford to have their time taken up trying to manage point solutions."

A summary report of Quocirca's findings is available for download here (PDF). ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.