Feeds

Windows is the 'biggest beta test in history' - Gartner

Less is more

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Spending more on security doesn't necessarily make you more secure, Gartner warned yesterday.

The analyst firm forecasts that information security spending will drop from an average six-to-nine per cent of IT budgets to between four and five per cent as organisations improve security management and efficiency. Victor Wheatman, Gartner security veep, told delegates at the IT Security Summit in London that the most secure organisations spend less than the average and that the lowest spending organisations are the most secure. The businesses can safely reduce the share of security in their overall IT budget to three or four per cent by 2006, he said.

The idea that the most secure organisations spend the most on security was among a number of myths debunked by Wheatman during a keynote before approximately 700 delegates at the Gartner IT security Summit yesterday. He also attacked the popular misconception that "software has to have flaws". Wheatman said this is true only if enterprises continue to buy flawed software, and he singled Microsoft out for particular criticism.

He described Windows as “the biggest beta test in history" and warned warned IT security pros not to expect too much from Microsoft’s vaunted Trustworthy Computing initiative. "Microsoft will try, and there'll be improvement with Longhorn, but it will not solve all your security problems - no matter what the richest man in the world says,” he said. According to Gartner better quality assurance of software is needed before it goes into production. If 50 per cent of vulnerabilities are removed prior to software being put in production then incident response costs would be reduced by 75 per cent, it estimates.

Gartner has identified IT security technologies enterprises will need over the next five years - and other technologies most companies probably won't need. On the enterprise shopping list is host-based intrusion prevention, identity management, 802.1X authentication and gateway spam and AV scanning. Security technologies Gartner reckons most companies can safely do without include personal digital signatures, biometrics, enterprise digital rights management and 500-page security policies. ®

Related stories

Insecurity downtime on the up
'Independent' report used MS-sourced data to trash OSS
Microsoft warns of poisoned picture peril
Investors fret about IT security

The Essential Guide to IT Transformation

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.