IT Security & Network Security News & Reviews: Security Spending Priorities for 2011 to Include Firewalls, Blocking Tools
Let's face itmaking the case for security spending isn't always easy. After all, if things are going right, attempts to attack your organization aren't successful, which can make it difficult to make the case for investing in new technology. Yet for a security professional, doing that can be the difference between a compromise and a peaceful, sleep-filled night. According to a Forrester Research report, security investments in 2011 will reflect the tactical and reactive approach most organizations are taking to security, and will be positioned around a few themes, including new cyber-security threats, changing IT architectures (such as virtualization and the consumerization of enterprise IT) and compliance regulations. Such reactive security measures include acquiring firewall solutions to block known bad or "visibly anomalous activity," rather than the more methodical malware found today, and data-security tools that block or detect "inadvertent policy violations rather than malicious data theft," Forrester said. In its third-quarter 2010 survey of 2,058 IT security decision-makers at enterprises as well as small and midsize businesses in North American and Europe, Forrester found that the priority for many organizations is data security, while investments in application-security and identity-management projects may take a hit. Here is a look at how corporations globally are spending their IT security dollars.
State of Security Market
IT security is a $35 billion market today, Forrester says. A combination of factorsincluding the threat landscape, the rise of new security technologies and changing data-security requirementsare driving growth. It also has led to a rising profile of CIOs54 percent of enterprise CIOs report to a C-level executive.