• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

    July 30, 2013 Alex Woodie

    In a new study commissioned by Oracle, researchers found that more than two-thirds of a typical organization’s IT security resources are allocated to protecting the network layer, leaving less than one-quarter of the resources to address the security needs of core infrastructure components, such as servers, applications, and databases.

    The study involved more than 110 companies that were contacted by CSO Custom Solutions Group on behalf of Oracle. The study asked the companies how they allocate their resources, including money and staff time, to address security concerns.

    Despite the fact that a breach of a database would be potentially catastrophic for an organization, two-thirds of organizations reported taking an “inside out” approach to security, which places a heavy emphasis on the network layer. By comparison, 35 percent reported using an end-point security strategy, which focuses more on protecting critical applications and data.

    Mary Ann Davidson, chief security officer at Oracle, says organizations would be better off focusing their attention on their most strategic assets, and working to implement stronger database and application security, and work on identity management.

    “Organizations can’t continue to spend on the wrong risks and secure themselves out of business,” Davidson says in a press release. “When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access.”

    The survey also found that, at 35 percent of organizations, security-related expenditures are influenced by sensational informational sources rather than real organizational risks. What’s more, 42 percent of survey respondents say they believe that they have more difficulty preventing new attacks than in the past.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    State Of IBM i Security Remains Poor, PowerTech Says

    PowerTech: IBM i Security Still Needs Work

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    System i Security: Lots of Room for Improvement



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    “Fixing Your Data Supply Chain”

    FREE Webinar

    You’ve optimized your business processes, products and services, but is there still a logistics gap between your data and your managers and analysts?

    See how NGS-IQ simplifies query, reporting, data visualization, and analytics tasks. Enjoy Microsoft 365 integration, multidimensional modeling, built-in email, and FTP – with IBM i security and performance.

    October 23, 2025, 11am Pacific/2pm Eastern

    RSVP: https://ngsi.news/chain

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  ASNA Wings® brings the world of mobile devices to your RPG applications.
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.
    NGS:  On Demand NGS-IQ demo. Watch and get a $5 Starbucks gift card.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Automatically Answering IBM i Unable To Allocate Record Messages IBM Dresses Up The Power 750+ In A Linux-Only Tuxedo

    Leave a Reply Cancel reply

Volume 13, Number 21 -- July 30, 2013
THIS ISSUE SPONSORED BY:

PowerTech
Cybernetics
Abacus Solutions
Profound Logic Software
Shield Advanced Solutions

Table of Contents

  • BlueFountain Delivers a Modern Looking WMS for IBM i
  • Computer Keyes Launches Automated Two-Way Communications from IFS
  • Infor M3 13.1–the Last Big Release for Some Time
  • HiT Software Feeds IBM i Data into Microsoft LightSwitch
  • PowerTech Delivers IBM i Security Data to HP ArcSight SIEM
  • Halcyon Bolsters IBM i Process Automation Solution
  • ASNA Touts Customer’s Success with RPG-to-.NET Conversion Tool
  • UCG Launches VAULT400 Reports
  • Maxava Customer Installs HA Software Just In Time
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42
  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle