IT Infrastructure - Change Changes Everything

Wood, Mak
August 2006
Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p35
Trade Publication
The article discusses the impacts of technological change in information technology and security management. It also suggests a logical way to manage attacks on computer systems which is through an access security solution that continuously monitors every asset's whereabouts and configurations to monitor infiltration or human error. One key benefit of software products that enable continuous monitoring is the automation of data collection and auditing.


Related Articles

  • 10 THINGS you should know now about... VIRTUALIZATION SECURITY.  // eWeek;7/6/2009, Vol. 26 Issue 12, p42 

    The article offers information concerning the concept of virtualization security. It relates that virtualization platforms are designed to create and deploy servers and applications when physical limitations governed system rollouts. It indicates that the capabilities in vSphere help ease...

  • The Secret of Effective Data Protection. Sweeney, Geoff // Database & Network Journal;Aug2008, Vol. 38 Issue 4, p21 

    The article discusses the factors that ensure effective data protection in Great Britain. The author stated that the Information Commissioner's Office (ICO) has disclosed its plans to promote the importance of appropriate security. In addition, organizations must understand the information flows...

  • Will the Web 2.0 bubble burst? Rapoza, Jim // eWeek;8/13/2007, Vol. 24 Issue 26, p54 

    The article reflects on the development of the Web 2.0 bubble that analysts fear for another technology bubble burst. The author explains that all this talk about bubbles lets him think about the classic cycles of busts. He states that same progression from pure technology to pure marketing can...

  • Further Reading.  // MarketWatch: Global Round-up;Jul2007, Vol. 6 Issue 7, p202 

    The article presents a list of latest reports and briefs related to technology. They include "Translational Medicine: Bridging pharmaceutical discovery and development with IT," "IT Security and the Role of Technology in Retail Banking Security" and "Outsourced Customer Care: how best to meet...

  • Harnessing IT Trends in 2014. Prabhas, Kumar // Dataquest;1/15/2014, Vol. 32 Issue 1, p30 

    The article discusses the initiatives on how to manage the Information Technology (IT) trends for future development, innovation and competitive advantage security in 2014. It states the need of organizations to look for new tools and techniques to hide sensitive information and access to the...

  • INFORMATION SECURITY MANAGEMENT SYSTEM IN ORGANIZATION. Pavlov, G.; Karakaneva, J. // Trakia Journal of Sciences;2011, Vol. 9 Issue 4, p20 

    The paper presents the review of policy and procedure concerning the development of Information Security Management System in organization. The attention is focused to the main aspects of security processes: at the conceptual level - standards for the System development and at the application...

  • There's a Bounty On Your Applications.  // Software World;Jan2011, Vol. 42 Issue 1, p7 

    The article offers the author's insights on the offering of rewards or bounty programs for the security of computer applications. The author states that their company find the possible harm of incentives to the security of end users. He reveals that the hackers will take advantage to identify...

  • Converged security pays dividends. Ting, David // Network World;6/18/2007, Vol. 24 Issue 24, p32 

    The article discusses the significance of security convergence to users and security staff. According to the author, the benefits of security covergence include the promotion of subtle changes to employee behavior that increase overall security, strengthens ability for companies to enforce...

  • Security 2.0.  // CIO Insight;May2007, Issue 81, p91 

    The article discusses the use of Web 2.0 for information technology corporate innovation. It is defined that Web 2.0 is an Internet tool or application which allows people to interact by contributing, editing and sharing content. Otherwise, Web 2.0 offers an opportunity for hackers and others...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics