dcsimg

Unifying IT Security

Michael Vizard

One of the gospels of IT security that many IT organizations adhere to is that it's critical to have the best-of-breed security technologies in place. The only issue with that approach is that it tends to create a fragmented approach to security that not only can be exploited, but is also expensive to maintain.


To address this issue, the folks at Hewlett-Packard have been developing an HP Enterprise Security Solutions framework that combines security technologies the company acquired when it bought companies such as 3Com and its TippingPoint unit, ArcSight and Fortify, coupled with a raft of internally develop HP products and cloud computing services.


According to Rebecca Lawson, director of worldwide cloud service initiatives for the HP Enterprise Business, the fragmentation of IT security not only increases the cost of managing IT security, it also makes it hard to correlate information to determine what users and systems are really at risk. As a result, it's little wonder, she says, that when it comes to IT security many IT organizations are simply baffled.


Lawson says HP is expanding its security portfolio today as part of an effort to unify IT security under a common management framework that first eliminates many of the seams that hackers are exploiting between disparate security products, while at the same time reducing the total cost of operating the environment thanks to remote monitoring services and increased reliance on IT automation.


There's no doubt that a lot of IT organizations these days are experiencing a fair amount of IT security fatigue, which means they are definitely looking for better ways to maintain security. The only real question now is whether IT organizations think security vendors finally have the goods to really solve the problem given their general disappointment with previous IT security investments.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
By using this site, you agree to the Privacy Policy