We use cookies to make sure our website better meets your expectations.
You can adjust your web browser's settings to stop accepting cookies. For further information, read our cookie policy.
SEARCH
IN Warsaw
Exchange Rates
Warsaw Stock Exchange - Indices
The Warsaw Voice » Business » February 25, 2011
Media
You have to be logged in to use the ReadSpeaker utility and listen to a text. It's free-of-charge. Just log in to the site or register if you are not registered user yet.
A Recipe for 3D Security
February 25, 2011   
Article's tools:
Print

Managing security complexity is the number one obstacle that enterprises face today, according to a recent Check Point and Ponemon Institute survey of over 2,400 IT security professionals. With the prevalence of data loss and the proliferation of Web 2.0 applications, mobile computing and the rise of sophisticated, blended attacks, it is no wonder that businesses—regardless of their size—are struggling to keep up with the evolving threat landscape.

A growing number of companies are realizing that security must be a more central part of their overall IT infrastructure. To achieve the level of protection that they need in the modern business environment, companies should consider implementing a blueprint for security that goes beyond technology and can engage employees in the security process, and ultimately, help organizations align their IT policies with their business needs.

In order to transform security into a business process, organizations should consider integrating three critical dimensions of security: policies, people and enforcement.

To improve security, organizations need to accomplish a better understanding of their current environments and outline their top priorities—both short- and long-term initiatives. For example, businesses today have cited governance, risk and compliance (GRC) as the top security priority for 2011—followed by securing endpoints, protecting against evolving threats, data security and securing virtual environments (Check Point and Ponemon research, 2011). Achieving 3D Security is not about deploying products and accumulating technologies—it’s about raising awareness about today’s security challenges, providing best practices to organizations, and linking them to high-level business needs and strategies. By educating end users and consolidating security with a holistic view of the organization, companies can minimize IT complexity, while enabling the business.

Juliette Sultan, head of global marketing at Check Point Software Technologies
© The Warsaw Voice 2010-2018
E-mail Marketing Powered by SARE