Menu
Understanding the problem will lead to better security spending: Websense

Understanding the problem will lead to better security spending: Websense

Security vendor recommends businesses identify weaknesses in their IT infrastructure instead of taking a blanket security approach

No amount of money will eliminate risk of exposure unless a business identifies the infrastructure that requires attention says Websense A/NZ country manager, Gerry Tucker.

Tucker backs this up with analyses from Gartner, Forrester and IDC that have found that 80 per cent of the overall IT security spend is concentrated on just 30 per cent of the problem.

“Firewalls, intrusion protection systems and endpoint security swallow up the lion’s share of the cash,” he said.

While Tucker admits it is always good to secure a requested budget to address the perceived IT security requirements of an organisation, he said the money could be better served in buying more basic products to fulfill these functions.

“This investment in so-called ‘compliance technologies,’ such as firewalls, can be reduced, with the savings redirected into new prevention and detection systems which continuously monitor the data which flows in and out of the company,” he said.

“Importantly, it is constantly checking for abnormalities so that a breach can be identified almost instantaneously.”

Tucker said this is often missing from company IT infrastructures which don’t have this level of monitoring capability.

“Breaches can often go undetected for up to a year, potentially causing untold damage in the interim,” he said.

Security check-up

Not only is the security landscape changing, but Tucker said it is evolving as well, and so should the responses to it.

“It is no longer acceptable to just green light a program that just meets minimum compliance requirements,” he said.

As for what part Websense plays in addressing this situation, Tucker said that the security vendor has put together a program offering a free risk assessment of companies’ IT infrastructure.

This initiative is designed to identify vulnerabilities so the security spend can be allocated in a “much more targeted fashion.”

“This lets organisations know where they need to target their spending much more effectively, and more importantly manages risk in a more strategic way,” he said.

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags securityAPT attackswebsense

Upcoming

Slideshows

IN PICTURES: ARN Distributor Roundtable, Sydney, 26.08.15 (+26 photos)

IN PICTURES: ARN Distributor Roundtable, Sydney, 26.08.15 (+26 photos)

ARN hosted a distributor roundtable at Cafe Del Mar in Sydney, at which attendees and their partners discussed the changing role of the traditional IT distributor. They spoke about the challenges of digital disruption, the blurring lines of the channel in the age of digital transformation, and examined the ever-evolving business models. This roundtable was sponsored by Distribution Central, Exclusive Networks, Rhipe, and Hemisphere Technologies. Photos by ARN Editorial Director, Mike Gee.

IN PICTURES: ARN Distributor Roundtable, Sydney, 26.08.15 (+26 photos)
IN PICTURES: Dicker Data TECHx 2015 - Sydney (+39 photos)

IN PICTURES: Dicker Data TECHx 2015 - Sydney (+39 photos)

The final leg of Dicker Data TECHx, the distributor's first ever partner roadshow, was held in Sydney at Luna Park. Partners mingled over drinks and canapes, enjoyed DD's CloudPortal launch, and 1-on-1 sessions with platinum sponsors HP, Cisco, Microsoft, Lenovo and Toshiba. ARN was official media partner, and Editor Allan Swann was MC for the event. Photos by Allan Swann

IN PICTURES: Dicker Data TECHx 2015 - Sydney (+39 photos)

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments