New Technologies Surpass Compliance as Driver for Organizations to Secure Data

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for key findings from data security research conducted by Vormetric.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

Vormetric, a leading data-centric security solution provider, recently announced the preliminary findings of its “Protect What Matters – Data Security” research. The results, compiled from a global online survey of more than 450 respondents, details newer IT trends and data breaches as primary security drivers. The research also highlights that protecting brand reputation and observing security best practices should be an organization’s primary motivators for data protection, while meeting compliance requirements also remains a major driver facing IT today.


“The security landscape has evolved considerably over the past 18 months. With advanced persistent threats recurring headline news, and as more organizations embrace the merits of cloud computing and Big Data, it is essential that enterprises ensure their IT infrastructure is geared up to keep pace with the changing market,” said Tina Stewart, vice president of marketing, Vormetric. “We wanted to conduct this research to assess the extent to which organizations’ security measures and motivations reflect these changes, and overall the study reveals that organizations are reassuringly starting to move in this direction.”

The online global survey gathered responses across a full range of markets – banking/financial services, retail, manufacturing, public sector and others.

 

More Slideshows

SurfWatchCyberCrimeTrends0x Trends in Cyber Crime: A Look at the First Half of 2014

A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights. ...  More >>

Misc40-290x195 Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ...  More >>

Security45-290x195 Cyber Crime: Law Enforcement Fights Back

While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.