Restricted budgets and information security
by Andrew Fourie - UK Country Manager at Astaro - Friday, 10 April 2009.
With the unraveling of the global financial system in 2008, analysts are confidently predicting that the real economy will experience a significant recession in 2009 and beyond. Most modern businesses rely on IT, which means that if they are to stay in business some aspects of their IT operations are non-negotiable. However, given inevitable budget scarcity, IT managers will be compelled to look much harder at how their ‘must-do’ operations, such as security, can be maintained with a higher degree of cost efficiency.

It’s easy to prove that information security is non-negotiable. If a business did try to do without, it’s almost guaranteed that within a few hour or days the integrity of its IT services will begin to break down.

The security of IT infrastructure is likely to be one area that a company will want to maintain, even in times of constrained finances. However, there is more than one way to implement IT security. Some approaches are less costly to deploy and can be managed more efficiently than others so stand a better chance of achieving financial sign-off.

A traditional security infrastructure incorporates multiple individual point solutions, each taking care of protecting IT infrastructure from a specific threat category. In this approach, a business has to select and buy multiple solutions, often from different vendors, and then manage their ongoing license arrangements.

The IT team has to design a network that can accommodate multiple solutions and manage the architecture over the long-term. Learning how to administer and successfully integrate solutions from multiple vendors presents a significant challenge. When a new threat appears, as it will, a new solution must be selected and deployed, adding to this complexity. The point solution approach is certain to be resource intensive and inevitably results in a high total cost of security.

An alternative security model is based on an integrated security appliance, often known as Unified Threat Management (UTM). All the applications needed to provide robust protection against all individual security risk categories are incorporated within a single appliance. The integration of appliances guarantees that all protection mechanisms work well together, straight out of the box, and there is only one administrative interface for the IT team to learn.

Additionally, when a new threat appears, the vendor of the integrated appliance will work to ensure that protection is rapidly incorporated as a software upgrade, avoiding disruption to the network architecture and allowing IT to become accustomed to the new protection in a familiar environment. The bottom line is that consolidation onto one appliance, simplification of the network and the ease of management of an integrated security appliance greatly reduce the cost of security.

No organization can afford to compromise on security but in this business climate no organization can be complacent in how much security is costing them. Now is the time that integrated security appliances will shine and show their true value.



Astaro is exhibiting at Infosecurity Europe 2009 held on 28th – 30th April in Earl’s Court, London.

Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //