New Technologies Surpass Compliance as Driver for Organizations to Secure Data

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for key findings from data security research conducted by Vormetric.

Vormetric, a leading data-centric security solution provider, recently announced the preliminary findings of its “Protect What Matters – Data Security” research. The results, compiled from a global online survey of more than 450 respondents, details newer IT trends and data breaches as primary security drivers. The research also highlights that protecting brand reputation and observing security best practices should be an organization’s primary motivators for data protection, while meeting compliance requirements also remains a major driver facing IT today.

“The security landscape has evolved considerably over the past 18 months. With advanced persistent threats recurring headline news, and as more organizations embrace the merits of cloud computing and Big Data, it is essential that enterprises ensure their IT infrastructure is geared up to keep pace with the changing market,” said Tina Stewart, vice president of marketing, Vormetric. “We wanted to conduct this research to assess the extent to which organizations’ security measures and motivations reflect these changes, and overall the study reveals that organizations are reassuringly starting to move in this direction.”

The online global survey gathered responses across a full range of markets – banking/financial services, retail, manufacturing, public sector and others.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security51-190x128 Six Security Predictions and Tips for SMBs in 2015

Small and medium-sized businesses (SMBs) are vital to the U.S. economy, yet they are often the most vulnerable when it comes to cybersecurity. ...  More >>

Global13-290x195 Six Reasons Why CES Should Scare the Hell out of Network Administrators

While the tech geek is busting at the seams with anticipation, the network admin is scared to death. All this technology results in bandwidth hoarding, security vulnerabilities and compliance concerns for IT departments. ...  More >>

WatchfulDataSecurity0x Tips for Securing Data in a Mobile World

Given the fluid nature of BYOD and related security issues, the next logical step is to approach the data's security independent of the device or location. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date