Compaq 108164-003 - ProLiant - 800 White Paper page 9

Compaq enterprise security framework
Hide thumbs Also See for 108164-003 - ProLiant - 800:
Table of Contents

Advertisement

W
P
HITE
APER
(cont.)
. .
. .
nature of some attacks, and because digital material can be copied without any evidence of access
. .
or theft. In addition, most computer crimes and security incidents go unreported because businesses
. .
. .
are unwilling to reveal the weaknesses of their computer systems to outsiders.
. .
. .
Vulnerability stems from the implementation of only basic security measures. The most commonly
. .
used of these are log-in passwords and anti-virus software. These solutions, however, are easily
. .
. .
defeated by a sophisticated virus attack. Unfortunately, the more advanced security solutions such
. .
. .
as firewalls, token-based (two-factor) authentication, and data encryption have earned only limited
. .
acceptance and installation so far.
. .
. .
While these factors have left IT managers gravely concerned about security issues, their
. .
. .
implementation of security solutions and technologies has lagged these concerns. Although three-
. .
quarters of IT managers reported that their senior management viewed security as a critical priority,
. .
. .
two-thirds of technology managers stated that they are not confident that their networks are
. .
protected from attack. Despite these concerns, 55% of companies spend 5% or less of their IT
. .
. .
budget on security, and the percentage of companies with an information security officer has
. .
actually declined over the past year.
. .
. .
. .
These facts point to several conclusions:
. .
. .
The need for enterprise-level security is increasing rapidly due to the growth in the networked
. .
and inter-networked computing environment, the vulnerability of corporate information and
. .
. .
assets, and the variety of threats that have emerged in this environment.
. .
. .
IT security expenditures are minute in comparison with the total losses caused by poor
. .
. .
computing security.
. .
. .
While the new threats to enterprise computing security are complex and diverse, the primary
. .
. .
causes (insiders, viruses, and passwords) are well known.
. .
. .
Demand for computing security will increase dramatically within the next 10-18 months.
. .
Enterprises will require device, internal network, and external network security solutions that
. .
. .
carry minimal costs and administrative overhead.
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
9

Advertisement

Table of Contents
loading

Table of Contents