• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

    July 30, 2013 Alex Woodie

    In a new study commissioned by Oracle, researchers found that more than two-thirds of a typical organization’s IT security resources are allocated to protecting the network layer, leaving less than one-quarter of the resources to address the security needs of core infrastructure components, such as servers, applications, and databases.

    The study involved more than 110 companies that were contacted by CSO Custom Solutions Group on behalf of Oracle. The study asked the companies how they allocate their resources, including money and staff time, to address security concerns.

    Despite the fact that a breach of a database would be potentially catastrophic for an organization, two-thirds of organizations reported taking an “inside out” approach to security, which places a heavy emphasis on the network layer. By comparison, 35 percent reported using an end-point security strategy, which focuses more on protecting critical applications and data.

    Mary Ann Davidson, chief security officer at Oracle, says organizations would be better off focusing their attention on their most strategic assets, and working to implement stronger database and application security, and work on identity management.

    “Organizations can’t continue to spend on the wrong risks and secure themselves out of business,” Davidson says in a press release. “When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access.”

    The survey also found that, at 35 percent of organizations, security-related expenditures are influenced by sensational informational sources rather than real organizational risks. What’s more, 42 percent of survey respondents say they believe that they have more difficulty preventing new attacks than in the past.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    State Of IBM i Security Remains Poor, PowerTech Says

    PowerTech: IBM i Security Still Needs Work

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    System i Security: Lots of Room for Improvement



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Software built on TRUST. Delivered with LOVE.

    For over 35 years, Rocket Software’s solutions have empowered businesses to modernize their infrastructure, unlock data value, and drive transformation – all while ensuring modernization without disruption.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  ASNA Wings® brings the world of mobile devices to your RPG applications.
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.
    NGS:  On Demand NGS-IQ demo. Watch and get a $5 Starbucks gift card.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Automatically Answering IBM i Unable To Allocate Record Messages IBM Dresses Up The Power 750+ In A Linux-Only Tuxedo

    Leave a Reply Cancel reply

Volume 13, Number 21 -- July 30, 2013
THIS ISSUE SPONSORED BY:

PowerTech
Cybernetics
Abacus Solutions
Profound Logic Software
Shield Advanced Solutions

Table of Contents

  • BlueFountain Delivers a Modern Looking WMS for IBM i
  • Computer Keyes Launches Automated Two-Way Communications from IFS
  • Infor M3 13.1–the Last Big Release for Some Time
  • HiT Software Feeds IBM i Data into Microsoft LightSwitch
  • PowerTech Delivers IBM i Security Data to HP ArcSight SIEM
  • Halcyon Bolsters IBM i Process Automation Solution
  • ASNA Touts Customer’s Success with RPG-to-.NET Conversion Tool
  • UCG Launches VAULT400 Reports
  • Maxava Customer Installs HA Software Just In Time
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Power11 Transistor Count Discrepancies Explained – Sort Of
  • Is Your IBM i HA/DR Actually Tested – Or Just Installed?
  • Big Blue Delivers IBM i Customer Requests In ACS Update
  • New DbToo SDK Hooks RPG And Db2 For i To External Services
  • IBM i PTF Guide, Volume 27, Number 33
  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle