to help enterprise security across Europe
The resource centre for busy senior executives seeking the latest insights into IT Compliance & Privacy issues for major organizations
 
sarbaines oxley ofcom communications regulator
Latest Resources      data protection register
compliance resources privacy resource center

Breaking Global News
Global Compliance and Privacy News
- Breaking News, updated every 30 minutes
•   Compliance, Privacy and Security
•  Money Laundering
•  Phishing
•  Regulatory Issues
•  SOX, Basel 2, MiFID


You Tell Us:
S
S
L

T
E
C
H
N
O
L
O
G
Y
We use SSL Technology for web data entry points:

Always
Sometimes
Never
What is SSL?

News
Are Smartphones Endangering Security? - Wick Hill
Dealing with Internet Security Threats - Ian Kilpatrick
How the New EU Rules on Data Export Affect Companies in and Outside the EU - Thomas Helbing
Farmers' Data Leak Highlights Old Technology Use - Wick Hill
Saving Money with SFTP - Wick Hill
UK Information Commissioner targets firm selling vetting data - Eversheds e80
12 Key Steps to Internet Security - Wick Hill
Telephone Monitoring Legality in the UK - Dechert
Firewall or UTM - Wick Hill
UK Information Commissioner demands mobile device encryption - Eversheds e80
Data loss - liability, reputation and mitigation of risk - Eversheds e80
Phorm, Webwise and OIX - BCS Security Forum
The challenges of PCI DSS compliance - Thales, Russell Fewing
"Quality" Data Vendor Spams us! Editor astounded!
National Gateway Security Survey 2008 - Wick Hill
Unified Threat Management - Watchguard Technologies

news archives
:
0 | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 |
12 | 13
[What is this?]

Industry Blogs
Tim Berners Lee's Blog
Tim Callan's SSL Blog
Davis Wright Tremaine's Privacy & Security Law Blog
Emergent Chaos Blog
Michael Farnum's Blog
Phillip Hallam-Baker's Blog - The dotFuture Manifesto: Internet Crime, Web Services, Philosophy
Stuart King's Security and Risk Management Blog
David Lacey's IT Security Blog
Metasploit Official Blog
Jeff Pettorino's Security Convergence Blog
Jeff Richards's Demand Insights Blog
David Rowe's Risk ManagementBlog
Bruce Schneier's Security Blog
Larry Seltzer's Security Weblog
Mike Spinney's Private Communications Blog
Richard Steinnon's Threat Chaos Blog
The TechWeb Blog
Tim Trent's Marketing by Permission Blog
Rebecca Wong 's DP Thinker Blog

Newsletters
23 February Newsletter
Newsletter Archives are located in "News"

Industry Update
Internet Security Intelligence Briefing - November 2005
Find out the latest trends in e-commerce, web usage & the latest threats from adware/Spyware

Reports
Phorm, Webwise and OIX
- BCS Security Forum

'The Any Era has Arrived, and Everyione has Noticed' - Stratton Sclavos - VeriSign
Identity Security - Time to Share
Malicious code threats - iDefense
Public Alerts - updated as they happen from Stopbadware.org
Public Alerts - updated as they happen from Websense
Public Advisories - updated as they happen, from iDefense
Phoraging - Privacy invasion through the Semantic web: a special report by Mike Davies of VeriSign

Legislation
Privacy Laws & Business International E-news, Issue 57
Privacy Laws & Business UNited Kingdom E-news, Issue 60

Security Reviews
February 2007 - VeriSign Security Review
The security review archive is here

Case Studies
Finance Industry
Case Study Example

A case study on a Finance industry company.

White Papers
VeriSign® Intelligent Infrastructure for the 21st Century
VeriSign® Intelligent Infrastructure for Security
VeriSign® Intelligent Infrastructure: An Overview
Identity Protection Fraud Detection Service - description of the service
Life of a Threat - Video on Threat Management Lifecycle
Optimizing Enterprise Information Security Compliance - Dealing with all the audits
For a full list of all whitepapers, visit our Whitepaper library

Legal Notices
Privacy Policy
Terms of use

basel 2 sarbanes oxley
    legislation
data controller notification binding corporate rules BCR data transfer third countries third part data transfer basel 2 regualtor regulation regulate FSA banking network security RSA encryptin algorithm Bits sacked bank staff
Blogs compliance Reports compliancy Legislation Data Protection Case Studies data privacy White Papers data protection act News information commissioner Events security standards Links information security iDefense
Retail Solutions

National Gateway Security Survey 2008 Shows Interesting Changes in Threat Landscape

compliance and privacy

Current News Updates

National Gateway Security Survey 2008 Shows Interesting Changes in Threat Landscape

Main findings

  • Strong move towards remote and mobile use.
  • Securing the network from external attack is top priority.
  • The focus for IT security is on external threat rather than internal threat. This is at variance with the threat risks most organisations face.
  • Green issues considered important, but that is not yet translating into purchasing IT security
  • Conditions right for UTM growth
  • Users' purchasing decisions show IT security is not commoditised.
  • Wireless and VoIP increasing

Strong Move Towards Remote and Mobile use

The National Gateway Security Survey 2008, carried out for value added distributor and security specialist Wick Hill and sponsored by WatchGuard Technologies, leaders in unified threat management systems, has highlighted the increasing move toward remote and mobile use, as well as the concerns users have about this shift. In a survey of 341 of the top UK companies, by employee number and turnover, 48% had over 150 remote users and a further 11% had 50 to 100 remote users. 61% said that the number of remote users on their network was increasing. 45% reported that the number of VPNs was increasing and 43% that the number of SSL users was increasing.

Focus is Still on External; Threat, Despite the Greater Danger of Inside Threat

Despite consistent research which shows that internal threat is a greater IT security risk than external threat, the survey showed that external threat is still perceived as the greater problem. This may be partly due to the regular drip of news on external security problems endured by a range of high profile organisations. Reinforcing this, the survey showed that the top priority for 2008 was securing the network from external attack, which 79% rated as very important. Securing remote access was rated very important by 75% and authenticating remote users was rated important by 67%.

Green Issues

Green issues have been prominent in the IT world over the last year, with many suppliers jumping on the bandwagon to present their products as offering green credentials. However the report shows that, while users are aware of the importance of green issues, they are not prepared to purchase IT security on green issues alone. They will only do so if ‘green' solutions also meet other commercial requirements, including price. When questioned about what their IT world would look like, 62% considered green issues to be important. Environmental impact, however, came well down the list of important issues in purchasing decisions at only 29%.

Conditions Right for UTM Growth

With the survey highlighting the increasing numbers of remote users and increasing concerns about security, UTMs are well placed to provide the firewalling features which respondents considered most important. 67%, for example, said that centralised management of multiple devices was a very important factor in firewall choice and 60% said that reporting was important. Both centralised management and reporting are greatly facilitated with the right UTM system, where a head office centralised management console can easily manage remote, same-brand UTMs, carrying out tasks such as configuration updates and implementing security policies at remote sites. With a greater number of remote users, together with a need for easier centralised management and good reporting, it makes sense to use fewer appliances. This again mitigates towards UTMs, which commonly combine up to five functions in one appliance.

Users Don't Consider Security to be Commoditised

The survey shows that users do not consider IT security to be commoditised. They prefer an easy to use solution and reseller/supplier knowledge. In answers to questions on the importance of various factors in IT purchasing, price came only fourth at 73%, behind ease of use at 90%, performance at 90% and reseller/supplier knowledge at 74%. The relationship with the supplier was also rated highly at 66%, while interestingly web purchasing availability came bottom of the list at only 15%.

Wireless and VOIP Increasing

The survey showed that both wireless use and VoIP use are increasing. 49% of the sample said that the number of VoIP users was increasing and 50% said that the number of wireless users was increasing.

Read the Survey


Ian Kilpatrick, the author, is chairman of Wick Hill Group plc, specialists in secure infrastructure solutions for ebusiness. Kilpatrick has been involved with the Group for over 30 years and is the moving force behind its dynamic growth. Wick Hill is an international organisation supplying most of the Times Top 1000 companies through a network of accredited resellers.

Kilpatrick has an in-depth experience of computing with a strong vision of the future in IT. He looks at computing from a business point-of-view and his approach reflects his philosophy that business benefits and ease-of-use are key factors in IT. He has had numerous articles published in the UK and oveseas press, as well as being a regular speaker at IT exhibitions.

CRN 2008 channel awards winnder of ' Channel Personality of the Year', he is never afraid to voice his opinions on all aspects of the industry and on IT security issues in particular. He has an in-depth experience of computing with an excellent understanding of the industry from the vendor, distributor, reseller and end user point-of-view.

He has a strong vision of the future in IT and IT security. His approach reflects his philosophy that business benefits and ease-of-use are key to successful infrastructure deployment.


Please contact Wick Hill on +44 (0)1483 227600, web www.wickhill.com.

 


This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.