Select language:    Bookmark and Share  
Home   Buy now   Screenshots   Compare   Download   Support   Partners   Contact
Product Info
Overview
Live video demos
Report & Management Live Demo
Screenshots
Editions Comparison
Why MyUSBOnly
Report & Management New!
Version History
Download free trial
See our clients
 
Ordering
Pricing
Buy now
Locate a local reseller
Purchase orders
Volume discounts
 
Support
Lost registration key
Online manual
Translations
Security news
Contact us
 


Encryption top IT security initiative in 2009 Security budgets as proportion of IT spend are rising

By Ellen Messmer Framingham

IT security budgets are increasing in 2009 to consume 12.6% of the entire IT operating budget, up from 11.7% in 2008, according to Forrester Research's survey of 942 IT and security managers in North America and Europe.

Staffing and upgrades to existing security technology are taking up over half of the IT security budgets overall, according to Forrester's report, "The State of Enterprise IT Security: 2008 to 2009". The survey also shows 20% of the available IT security funding this year is expected to go to security outsourcing, consultants and managed services, with another 18.5% targeting new security initiatives.

Full-disk encryption was cited as the top client security technology to be piloted or adopted this year, along with file-level encryption. About a fifth of the organisations also said they expect to pilot or adopt data-leak prevention during the next twelve months, though there appears to be less interest in desktop DLP than network-based DLP.

The survey's respondents also indicated interest in deploying identity and access-management (IAM) technologies, particularly single sign-on, unified monitoring of users' rights and activities and provisioning. The main reason given for adopting IAM was security and governance along with regulatory compliance. Among the technologies least anticipated to be piloted or adopted is application lockdown for endpoint control.

Not surprisingly, the biggest challenges for data security were cited to be "cost and business justification" and "complexity of architectural efforts needed," according to the 942 respondents.


 

SATISFACTION
GUARANTEED!

 

We offer you a 30-day unconditional money back guarantee! 100% satisfaction or your money back.

 

SYSTEM
REQUIREMENTS

 

Microsoft Windows XP, Server 2003, 2008, Vista, 7, 8, 10, 11 - MyUSBOnly is not a resource-consuming utility.

 

Home | Pricing | Buy now | Screenshots | Download | Support | Resellers | Affiliates | Pressroom | Contact | About | Sitemap

Copyright © Whatlink Software Limited. 2003-2023. All Rights Reserved. EULA | Privacy Statement