• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

    July 30, 2013 Alex Woodie

    In a new study commissioned by Oracle, researchers found that more than two-thirds of a typical organization’s IT security resources are allocated to protecting the network layer, leaving less than one-quarter of the resources to address the security needs of core infrastructure components, such as servers, applications, and databases.

    The study involved more than 110 companies that were contacted by CSO Custom Solutions Group on behalf of Oracle. The study asked the companies how they allocate their resources, including money and staff time, to address security concerns.

    Despite the fact that a breach of a database would be potentially catastrophic for an organization, two-thirds of organizations reported taking an “inside out” approach to security, which places a heavy emphasis on the network layer. By comparison, 35 percent reported using an end-point security strategy, which focuses more on protecting critical applications and data.

    Mary Ann Davidson, chief security officer at Oracle, says organizations would be better off focusing their attention on their most strategic assets, and working to implement stronger database and application security, and work on identity management.

    “Organizations can’t continue to spend on the wrong risks and secure themselves out of business,” Davidson says in a press release. “When attackers do break through the perimeter, they can take advantage of weak security controls against the core systems by exploiting privileged user access, vulnerable applications, and accounts with excessive access.”

    The survey also found that, at 35 percent of organizations, security-related expenditures are influenced by sensational informational sources rather than real organizational risks. What’s more, 42 percent of survey respondents say they believe that they have more difficulty preventing new attacks than in the past.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    State Of IBM i Security Remains Poor, PowerTech Says

    PowerTech: IBM i Security Still Needs Work

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    System i Security: Lots of Room for Improvement



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Join us for this webinar where we’ll showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Register now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ASNA:  ASNA Wings® brings the world of mobile devices to your RPG applications.
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.
    NGS:  On Demand NGS-IQ demo. Watch and get a $5 Starbucks gift card.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Automatically Answering IBM i Unable To Allocate Record Messages IBM Dresses Up The Power 750+ In A Linux-Only Tuxedo

    Leave a Reply Cancel reply

Volume 13, Number 21 -- July 30, 2013
THIS ISSUE SPONSORED BY:

PowerTech
Cybernetics
Abacus Solutions
Profound Logic Software
Shield Advanced Solutions

Table of Contents

  • BlueFountain Delivers a Modern Looking WMS for IBM i
  • Computer Keyes Launches Automated Two-Way Communications from IFS
  • Infor M3 13.1–the Last Big Release for Some Time
  • HiT Software Feeds IBM i Data into Microsoft LightSwitch
  • PowerTech Delivers IBM i Security Data to HP ArcSight SIEM
  • Halcyon Bolsters IBM i Process Automation Solution
  • ASNA Touts Customer’s Success with RPG-to-.NET Conversion Tool
  • UCG Launches VAULT400 Reports
  • Maxava Customer Installs HA Software Just In Time
  • Focus on Network Security Overlooks Importance of Protecting Data, Oracle Study Finds

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle