Defending The Network
by Simon Perry - VP Security Strategy, EMEA, Computer Associates - Monday, 23 August 2004.
As targeted and indiscriminate attacks become more commonplace, IT managers are being forced to deploy both integrated and point-based solutions to secure every part of their computing environments. It follows that the proliferation of security solutions brings new infrastructure and software management challenges.

In response to this demand, new software has been developed to centralize the management and provisioning of numerous IT security packages. This provides the IT team with a unified view of all PC users within the organization and allows the team to set up new users and allocate, which applications employees can access. There is an IT adage that stipulates Ďif you canít see a device or software application on the network, you canít manage ití and this is particularly true of IT security.

Spotlight

Total cost of average data breach reaches $3.8 million

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries. The average cost incurred for each lost or stolen record containing sensitive and confidential information increased from $145 to $154.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, May 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //