Portals eNewsletters Web Seminars dataWarehouse.com DM Review Magazine
DM Review | Covering Business Intelligence, Integration & Analytics
   Covering Business Intelligence, Integration & Analytics Advanced Search
advertisement

RESOURCE PORTALS
View all Portals

WEB SEMINARS
Scheduled Events

RESEARCH VAULT
White Paper Library
Research Papers

CAREERZONE
View Job Listings
Post a job

Advertisement

INFORMATION CENTER
DM Review Home
Newsletters
Current Magazine Issue
Magazine Archives
Online Columnists
Ask the Experts
Industry News
Search DM Review

GENERAL RESOURCES
Bookstore
Buyer's Guide
Glossary
Industry Events Calendar
Monthly Product Guides
Software Demo Lab
Vendor Listings

DM REVIEW
About Us
Press Releases
Awards
Advertising/Media Kit
Reprints
Magazine Subscriptions
Editorial Calendar
Contact Us
Customer Service

Companies That Use Technology to Reduce Security Threats Can Also Reduce Costs and Boost Profits

    Online News published in DMReview.com
February 7, 2006

Companies that use technology to help thwart internal threats to their information systems can also lower IT labor costs and contribute to corporate liquidity, according to new research from AberdeenGroup.

The research, presented in "The Insider Threat Benchmark Report: Strategies for Data Protection," demonstrates that a company's ability to boost profits, reduce expenses and contribute to its liquidity requires interaction between operations, audit, networking and application development. This is driving the growth of operational and audit expertise to address inadvertent and intentional leakage of company information. Also, regulatory requirements increase the need for physical controls and software access controls to secure confidential client and company information.

As a first step to attaining best-in-class success, companies must understand the interaction between operations, audit, networking, and application development, and should evaluate their processes to ensure they:

  • Use access control lists to monitor the applications and resources employees utilize;
  • Remember that "one size does not fit all" and IT vendors may not support the same protocols and standards;
  • Balance quantitative and qualitative measurements;
  • Balance the cost of implementing technology with reducing risk; and
  • Develop contingency plans in the advent of insider attacks.
The Insider Threat Benchmark Report arms readers with actionable frameworks to benchmark their security programs against industry average and best-in-class performers.
...............................................................................

For more information on related topics visit the following related portals...
ROI and Security.

This piece has been brought to you by the DM Review Editorial staff.



E-mail This Online News E-Mail This Online News
Printer Friendly Version Printer-Friendly Version
Related Content Related Content
Request Reprints Request Reprints
Advertisement
advertisement
Site Map Terms of Use Privacy Policy
SourceMedia (c) 2006 DM Review and SourceMedia, Inc. All rights reserved.
SourceMedia is an Investcorp company.
Use, duplication, or sale of this service, or data contained herein, is strictly prohibited.