[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Binding security into the ecosystem

December 2009 | 11 pages | ID: B54DDD6FDADEN
Ovum

US$ 895.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The days of trying to secure IT systems by simply adding ever more security products are over. Procurement and operating costs and insecurity driven by complexity have ended their reign. Security professionals have recognised that security has to be incorporated at all levels, from the foundation infrastructure to the business processes. Fortunately, this approach is consistent with meeting financial pressures to contain IT costs and improve and rationalise business efficiency where the procurement of security technology is concerned.
Executive summary
In a nutshell
Key messages
Security is more effective when integrated into the ecosystem
Security should be integrated with both the IT infrastructure and the business processes
Price pressure is emphasising the need for integration
Security is central to enterprise IT
Security needs to be built into systems and processes
Securing cloud-based applications and data
The security budget is finite and tightening
Integrating security into the ecosystem
Two complementary approaches
The COBIT model
Business process integration
Risk-driven security
Anti-fraud
Identity management and access control
Application security
Integrating security into the infrastructure
The Microsoft trusted stack
Virtualisation
Encryption and key management
DLP/email demonstrates the need for business configuration even at the infrastructure level
Browser security
Removable media
Data storage systems and compliance
Market impact
Security demands just keep on growing
Vendors can’t do what they want
Disruptive effects on vendors

LIST OF FIGURES

Figure 1: Microsoft’s ‘Palladium’ vision


More Publications