The State of Endpoint Security

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Previous Next

Click through for results from a security survey conducted by the Ponemon Institute on behalf of Lumension Security.

Despite all the concern expressed about IT security and a significant increase in the quantity and complexity of attacks, not much seems to be actually improving.

A new survey of 688 IT security professionals in the U.S., conducted by the Ponemon Institute on behalf of Lumension Security, finds that not only is there an over-reliance on anti-virus software, but also that the amount of time IT organizations are spending on security issues is starting to have a significant impact on the rest of IT operations.

More Slideshows:


Beware: Twelve More Holiday Scams to Avoid Cyber scrooges work overtime during the holiday season – new threats hit mobile, email and the Web.

Seven Enterprise Search Appliances That Can Save the Day Appliances that can help you tame out-of-control document management.

Ten Ways to Optimize SharePoint 2010 for Peak Performance Top 10 management tips for SharePoint.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Risk8-290x195 Survey Reveals Message Supervision Plays a Growing Role in Risk Prevention

Overall, the study found that compliance is taking on a more significant role across organizations – moving beyond traditional archiving and e-discovery efforts, to add value to sales and marketing, HR, risk assessment and cybersecurity. ...  More >>

Gov2-290x195.jpg Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. ...  More >>

Security65-190x128 Tipping the Data Breach Odds in Your Favor

A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date