Security Reigns Supreme
We’ve been concerned for some time about corporate vulnerabilities, as recession-driven spending cuts drove many organizations into await-and-see mode about information security. Well, perhaps Facebook has cured
them of this complacency. Its numerous privacy breaches in 2010 created headlines, but in more general terms, the explosion of social networking use in the workplace has combined with increasing use of mobile technology as a source of risk to create renewed interest in security deployments for next year.
Nearly half of the organizations we surveyed are expecting significant investment in security in 2011, with the vast majority of them increasing their investments from 2010 levels.
There’s also marked interest in continuity initiatives, backed by significant support from executives and finance groups.
In a recent survey by Deloitte & Touche LLP, 36 percent of tech-exec respondents indicated that their companies had increased security budgets by up to 10 percent this year, and 10 percent of those respondents had increased these budgets by more than 10 percent.
But Irfan Saif, principal at Deloitte & Touche, suggests asking whether these designated budgets are enough. “The adoption of cloud computing, social media and mobility solutions is on the rise,” he says, “both in the enterprise and in consumer realms. These solutions introduce some new challenges from a security perspective.”
It’s clear from our survey respondents that North American business will be responding to security issues in 2011. Consider BGMX Retail Solutions, which faces the challenge of securing its enterprise operations while still using valuable social networking, Web 2.0 and smartphone tools -- all of which can increase the potential for a virus/malware intrusion.
Based in Vestal, N.Y., this provider of retail IT solutions and services runs its operations on two networks with many remote clients, so security needs are a top priority. To meet these needs, the company is using SonicWall network security appliances that provide application intelligence, control and visualization capabilities.
“Because of the architecture of our system, a centralized management system was put in place for our primary firewalls, as well as all of our customers’ firewalls in different areas of the country,” says Erin Desko, BGMX CTO. “I can monitor any firewall at any given time, change rules, see who is connected and apply changes -- all from one screen -- and not have to remember different IPs, log-in screens, etc. It now takes less time to ensure that everything is working correctly and allows more time to focus on our customers.”