• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Spending to Jump in 2010, Forrester Says

    February 2, 2010 Alex Woodie

    Spending on IT security will increase this year compared to previous years, Forrester Research said last week. The increase is due to concerns from companies of all sizes over the security threat posed by the fast “consumerization” of technology such smart phones and Web 2.0 interfaces.

    About 40 percent of businesses will significantly increase their IT security spending this year, according to Forrester’s survey of more than 2,200 companies in North America and Europe. The group found that 42 percent of larger companies are planning on increasing their spending by 5 percent or more, while 37 percent of small and medium sized businesses will do the same.

    Forrester attributes the expected increase in IT spending to an unexpected source: the proliferation of consumer devices and consumer-focused technologies in the workplace. Concerns over the security of smartphones was cited by 46 percent of larger companies, while 38 percent cited Web 2.0 technologies as damaging their security posture.

    Forrester sounded somewhat surprised that consumer technologies were causing security concerns, as opposed to technology trends more commonly attributed with enterprise, such as cloud computing or server virtualization.

    “In general, this follows the broader trend of IT losing centralized control of technology adoption, deployment, and use,” states Forrester analyst and vice president, Jonathan Penn, in a Forrester announcement. “It’s not just consumer technology like iPods and the use of Facebook or Twitter. It also shows up in the uncontrolled proliferation of SharePoint sites by business groups or in the use of cloud computing services by application developers.”

    More than 80 percent of all businesses identified managing vulnerabilities and complex threats as a high priority in the coming year. There is good news in that number, because it shows that IT managers are getting the message. IT security professionals have been warning the community for years over the rise of so-called “blended” threats, which refers to the cyber-criminal practice of simultaneously using several techniques–such as sending malformed e-mail messages that direct users to a hijacked Web site that installs a Trojan on their computer that turns it into a node of a zombie network–to accomplish their nefarious goals.

    RELATED STORIES

    Security Advice for 2010: Trust No One

    Web Site Vulnerabilities Continue Unabated, IBM X-Force Says

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    In Search Of a More Secure Internet



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Software built on TRUST. Delivered with LOVE.

    For over 35 years, Rocket Software’s solutions have empowered businesses to modernize their infrastructure, unlock data value, and drive transformation – all while ensuring modernization without disruption.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  Why Web Enable? View the FREE on-demand webinar and get a FREE white paper
    RevSoft:  Enterprise solutions for data transfers, messaging and scheduling
    COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    SAP to Finally Ship Business ByDesign SaaS Suite What a Lifelong DB2 Fanatic Sees in MySQL

    Leave a Reply Cancel reply

Volume 10, Number 5 -- February 2, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
Bytware StandGuard Security
RevSoft
DRV Technologies
VAULT400

Table of Contents

  • Island Pacific Rediscovers i/OS Roots with Retail Apps
  • From Passwords to MFT, Cyber-Ark Has a Vault for That
  • Utilities Department Gains Workflow Efficiencies from S4i Systems
  • m-Power Gets New Interactive Reporting Templates
  • VAI Shows Confidence in 2010 with New Hires
  • Kofax Streamlines Installation, Exception Handling with Capture 9.0
  • ACOM Bolsters Security of Content Management System
  • Informatica Reports Solid Financial Results, Nabs MDM Vendor Siperian
  • Security Spending to Jump in 2010, Forrester Says
  • Dutch Consultant Taps Magic’s iBolt for JDE Integration Projects

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20
  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle