Inside the Briefcase

2017 State of Technology Training

2017 State of Technology Training

Pluralsight recently completed an in-depth survey of 300 enterprises...

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami,...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens...

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

with Shawn Moore, Solodev
In this interview, Shawn Moore,...

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Cloud, Smartphones Complicate Enterprise Security

January 18, 2011 No Comments

Companies have been quick to embrace mobile devices and cloud computing environments, but they’re still too reliant on dated security methods.

Most enterprises are unnecessarily leaving their data and networks open to attack from hackers, primarily because most have failed to embrace advanced security applications and policies needed to safeguard the cloud computing and mobile networks they’ve invested so heavily in the past few years.

That’s the overarching conclusion of a new (PDF format) study released this week by Forrester Consulting and security software vendor Symantec (NASDAQ: SYMC).

Fifty-four percent of the 306 companies with 1,000 to 20,000-plus employees surveyed reported a significant data breach last year. And as companies of all sizes increase their reliance on the cloud and a small army of smartphones and tablet PCs, that figures will almost surely rise unless IT managers start making the expensive and time-consuming commitment to advanced authentication security applications.

Read More…

News

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner Infrastructure


Gartner Application Strategies


IBC 2017

ITBriefcase Comparison Report