• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Spending to Jump in 2010, Forrester Says

    February 2, 2010 Alex Woodie

    Spending on IT security will increase this year compared to previous years, Forrester Research said last week. The increase is due to concerns from companies of all sizes over the security threat posed by the fast “consumerization” of technology such smart phones and Web 2.0 interfaces.

    About 40 percent of businesses will significantly increase their IT security spending this year, according to Forrester’s survey of more than 2,200 companies in North America and Europe. The group found that 42 percent of larger companies are planning on increasing their spending by 5 percent or more, while 37 percent of small and medium sized businesses will do the same.

    Forrester attributes the expected increase in IT spending to an unexpected source: the proliferation of consumer devices and consumer-focused technologies in the workplace. Concerns over the security of smartphones was cited by 46 percent of larger companies, while 38 percent cited Web 2.0 technologies as damaging their security posture.

    Forrester sounded somewhat surprised that consumer technologies were causing security concerns, as opposed to technology trends more commonly attributed with enterprise, such as cloud computing or server virtualization.

    “In general, this follows the broader trend of IT losing centralized control of technology adoption, deployment, and use,” states Forrester analyst and vice president, Jonathan Penn, in a Forrester announcement. “It’s not just consumer technology like iPods and the use of Facebook or Twitter. It also shows up in the uncontrolled proliferation of SharePoint sites by business groups or in the use of cloud computing services by application developers.”

    More than 80 percent of all businesses identified managing vulnerabilities and complex threats as a high priority in the coming year. There is good news in that number, because it shows that IT managers are getting the message. IT security professionals have been warning the community for years over the rise of so-called “blended” threats, which refers to the cyber-criminal practice of simultaneously using several techniques–such as sending malformed e-mail messages that direct users to a hijacked Web site that installs a Trojan on their computer that turns it into a node of a zombie network–to accomplish their nefarious goals.

    RELATED STORIES

    Security Advice for 2010: Trust No One

    Web Site Vulnerabilities Continue Unabated, IBM X-Force Says

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    In Search Of a More Secure Internet



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Raz-Lee Security is the leader in security and compliance solutions that guard business-critical information on IBM i servers. We are committed to providing the best and most comprehensive solutions for compliance, auditing, and protection from threats and ransomware. We have developed cutting-edge solutions that have revolutionized analysis and fortification of IBM i servers.

    Raz-Lee’s flagship iSecurity suite of products is comprised of solutions that help your company safeguard and monitor valuable information assets against intrusions. Our state-of-the-art products protect your files and databases from both theft and extortion attacks. Our technology provides visibility into how users access data and applications, and uses sophisticated user tracking and classification to detect and block cyberattacks, unauthorized users and malicious insiders.

    With over 35 years of exclusive IBM i security focus, Raz-Lee has achieved outstanding development capabilities and expertise. We work hard to help your company achieve the highest security and regulatory compliance.

    Key Products:

    • AUDIT
    • FIREWALL
    • ANTIVIRUS
    • ANTI-RANSOMWARE
    • MULTI-FACTOR AUTHENTICATION
    • AP-JOURNAL
    • DB-GATE
    • FILESCOPE
    • COMPLIANCE MANAGER
    • FIELD ENCRYPTION

    Learn about iSecurity Products at https://www.razlee.com/isecurity-products/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    looksoftware:  Why Web Enable? View the FREE on-demand webinar and get a FREE white paper
    RevSoft:  Enterprise solutions for data transfers, messaging and scheduling
    COMMON:  Join us at the annual 2010 conference, May 3 - 6, in Orlando, Florida

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    SAP to Finally Ship Business ByDesign SaaS Suite What a Lifelong DB2 Fanatic Sees in MySQL

    Leave a Reply Cancel reply

Volume 10, Number 5 -- February 2, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
Bytware StandGuard Security
RevSoft
DRV Technologies
VAULT400

Table of Contents

  • Island Pacific Rediscovers i/OS Roots with Retail Apps
  • From Passwords to MFT, Cyber-Ark Has a Vault for That
  • Utilities Department Gains Workflow Efficiencies from S4i Systems
  • m-Power Gets New Interactive Reporting Templates
  • VAI Shows Confidence in 2010 with New Hires
  • Kofax Streamlines Installation, Exception Handling with Capture 9.0
  • ACOM Bolsters Security of Content Management System
  • Informatica Reports Solid Financial Results, Nabs MDM Vendor Siperian
  • Security Spending to Jump in 2010, Forrester Says
  • Dutch Consultant Taps Magic’s iBolt for JDE Integration Projects

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The IBM i Power10 Upgrade Cycle Forecast Looks Favorable
  • White Hats Completely Dismantle Menu-Based Security
  • Cloud Software To Drive Enterprise Application Growth
  • How Do You Stay In Touch With The IBM i Community?
  • IBM i PTF Guide, Volume 25, Number 6
  • Security Still Top Concern, IBM i Marketplace Study Says
  • Bob Langieri Shares IBM i Career Trends Outlook for 2023
  • Kisco Brings Native SMS Messaging to IBM i
  • Four Hundred Monitor, February 1
  • 2023 IBM i Predictions, Part 4

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.