• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

    July 30, 2013 Alex Woodie

    In a new study commissioned by Oracle, researchers found that more than two-thirds of a typical organization’s IT security resources are allocated to protecting the network layer, leaving less than one-quarter of the resources to address the security needs of core infrastructure components, such as servers, applications, and databases.

    The study involved more than 110 companies that were contacted by CSO Custom Solutions Group on behalf of Oracle. The study asked the companies how they allocate their resources, including money and staff time, to address security concerns.

    Despite the fact that a breach of a database would be potentially catastrophic for an organization, two-thirds of organizations reported taking an “inside out” approach to security, which places a heavy emphasis on the network layer. By comparison, 35 percent reported using an end-point security strategy, which focuses more on protecting critical applications and data.

    Mary Ann Davidson, chief security officer at Oracle, says organizations would be better off focusing their attention on their most strategic assets, and working to implement stronger database and application security, and work on identity management.

    “Organizations can’t continue to spend on the wrong risks and secure themselves out of business,” Davidson says in a press release. “When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access.”

    The survey also found that, at 35 percent of organizations, security-related expenditures are influenced by sensational informational sources rather than real organizational risks. What’s more, 42 percent of survey respondents say they believe that they have more difficulty preventing new attacks than in the past.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    State Of IBM i Security Remains Poor, PowerTech Says

    PowerTech: IBM i Security Still Needs Work

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    System i Security: Lots of Room for Improvement



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  ASNA Wings® brings the world of mobile devices to your RPG applications.
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.
    NGS:  On Demand NGS-IQ demo. Watch and get a $5 Starbucks gift card.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Automatically Answering IBM i Unable To Allocate Record Messages IBM Dresses Up The Power 750+ In A Linux-Only Tuxedo

    Leave a Reply Cancel reply

Volume 13, Number 21 -- July 30, 2013
THIS ISSUE SPONSORED BY:

PowerTech
Cybernetics
Abacus Solutions
Profound Logic Software
Shield Advanced Solutions

Table of Contents

  • BlueFountain Delivers a Modern Looking WMS for IBM i
  • Computer Keyes Launches Automated Two-Way Communications from IFS
  • Infor M3 13.1–the Last Big Release for Some Time
  • HiT Software Feeds IBM i Data into Microsoft LightSwitch
  • PowerTech Delivers IBM i Security Data to HP ArcSight SIEM
  • Halcyon Bolsters IBM i Process Automation Solution
  • ASNA Touts Customer’s Success with RPG-to-.NET Conversion Tool
  • UCG Launches VAULT400 Reports
  • Maxava Customer Installs HA Software Just In Time
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle