InformationWeek Financial Services Special Reports

Perimeter Security

Issue link: http://dc.tw.ubm-us.com/i/225519

Contents of this Issue

Navigation

Page 2 of 24

[ Perimeter Security ] Inside 3 6 10 13 18 23 Rejiggering Budgets For Better Perimeter Control Reaping The Security Rewards Of SDN Is The Perimeter Really Dead? The Future Of IntrusionPrevention Systems Next-Gen Firewalls Change Rules Of Firewall Management Datacenter Servers Exposed DOWNLOAD PDF Rejiggering Budgets For Better Perimeter Control Most Tweeted Put the 'boring' blocking and tackling tools before shiny, new expenses. [ By Ericka Chickowski ] A s is the case in any other business, IT security leaders must contend with finite resources. As a result, they must depend on smart decisions about where to target their budgets to ensure that they leave as few gaps as possible. The only problem, and one security folks have dealt with for years, is that they tend to be seduced by the latest innovation rather than the fundamental management tools necessary to implement enough control over network and system infrastructure to properly manage their risks. "When it comes to security budget, security organizations are very much like my children: They want to buy whatever they've seen last and is shiny and new and promises unbelievable results," says Alan Shimel, managing partner of The CISO Group. "A serious dose of pragmatism and maybe just a little maturity would go a long way." 3 k

Articles in this issue

Links on this page

view archives of InformationWeek Financial Services Special Reports - Perimeter Security