Feeds

IT managers prescribe holistic security

But don't swallow own medicine

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Reg Reader Studies A Quocirca Reg Reader Study has found that while an overwhelming majority of IT managers believe that security measures should be managed centrally, just over half have actually begun to implement such a policy, and a paltry 18 per cent have actually completed deployment.

Quocirca's research - sponsored by Computer Associates - contains input from 1,200 IT managers from Europe and North America. It concludes that 60 per cent of businesses continues to manage point solutions individually, even though only one third of those surveyed think that this is the most effective solution. Quocirca principal analyst Jon Collins notes: "This suggests that tactical solutions are distracting companies from the real challenge, of defining and deploying a corporate security policy that takes a holistic view of the business risks and enables the implementation of comprehensive solutions."

The implications of not giving your firm a dose of holistic security medicine are clear, as Computer Associates' Simon Perry says: "At a time when Trojans, worms and viruses are constantly evolving and blending to create new security threats, IT managers cannot afford to have their time taken up trying to manage point solutions."

A summary report of Quocirca's findings is available for download here (PDF). ®

Beginner's guide to SSL certificates

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.