McAfee Study Finds SIEM, Database Security Top Priorities

This week, McAfee released the results of its annual study examining how IT decision-makers see and tackle risk and compliance management challenges given “a highly regulated and increasingly complex global business environment.” According to Risk and Compliance Outlook: 2012, concerns over persistent threats have driven database security and security information and event management (SIEM) to the top of IT’s list of concerns.

More

Posted by Jim Powell0 comments


Financial Fraud Tops List of Threat Motivators

In a new research report conducted by the Ponemon Institute released today, nearly 2 out of 3 respondents (65 percent) say financial fraud is the motivating factor behind targeted threats. That’s followed by “intent to disrupt business operations” and “stealing customer data” (both at 45 percent); just 5 percent of attacks are believed to be politically or ideologically motivated.

More

Posted by Jim Powell2 comments


Privacy Concerns Driving Social Networks In-House

When it comes to social media, the adoption by users of public services has many IT departments worried.  To stem the tide, many enterprises are choosing to build their own social networks or use services that promise privacy.

More

1 comments


Managing Data Center Sprawl, Improving Big Backup Efficiency Top IT Data Protection Concerns

The SEPATON Data Protection Index is the company’s annual report that takes the pulse of large enterprises (those with 1,000 or more employees) in North America and Europe that have to protect a minimum of 50 terabytes. The survey, conducted in April 2012, is asked 93 IT professionals about what data protection issues were troubling them, especially in light of big data volumes.

More

Posted by Jim Powell0 comments


Secure and Manage Employee Mobile Devices in Three Steps

A new BYOD Policy Implementation Guide has been released by Absolute Software. The no-nonsense, free of fluff, 6-page guide gives you the basics -- it’s what you need to know to “efficiently incorporate employee-owned devices into your deployment while securing and protecting corporate infrastructure and data.”

More

Posted by Jim Powell0 comments


Disaster Preparedness Buoys Cloud, Virtualization, and Mobile Adoption at SMBs

Cloud, virtualization, and mobile -- all three are big buzz words. A survey of small and mid-size businesses (SMBs) conducted by Symantec Corp, 2012 Disaster Preparedness Survey, looks at SMBs are often adopting the technologies with disaster preparedness in mind. The bottom line: it’s paying off.

More

0 comments


IT’s Poor Customer Satisfaction: Don’t Blame Developers

A new report, IT Trends and Outlooks: Why IT Should Forget About Development,” should be a wake up call for IT developers and operations staff. As IT has become more “consumerized” over the last several years, “business users across all industries now expect their IT departments to deliver IT innovation and services at breakneck speed.”

More

0 comments


Is IT Prepared for Video-Conference Bandwidth Surge?

A year from now, 40 percent of your network traffic will likely be taken up by video conferencing according to more than half of the 104 network engineers, IT managers, and executives at Interop surveyed by Network Instruments. Currently such traffic makes up just 29 percent of bandwidth use.

More

1 comments