Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Protection technology deployment survey.

ISC Squared : 10 April, 2008  (Technical Article)
Perimeter security for IT systems shows strong preference for firewalls and physical security according to survey conducted by (ISC)2
Preview results from the 2008 (ISC)2 Global Information Security Workforce Study, conducted by industry analysts Frost & Sullivan, highlights a growing desire for information security professionals to protect specific data, as well as corporate and government networks. When asked what security technologies were deployed in their organizations, 66% of 6,523 certified information security professionals surveyed globally said they had deployed cryptography and 65 % database security. However, the most deployed security technologies are firewalls (92%), physical security (79%), intrusion detection (78%), and identity and access management (73%). This shows that the majority of organisations have good perimeter security technologies in place. Wireless and vulnerability management technologies, both deployed by only 57% of the members surveyed, were outside of the top 10 technologies identified. The full study, to be released at Infosecurity Europe on Tuesday 22nd April in a keynote presentation, covers responses from professionals responsible for information security management in over 100 countries.

"Consistent with recent headlines that highlight great concerns with data loss, this study suggests that companies are making investments in this area, indicating a growing trend to implement security beyond the perimeter. Information security strategy is evolving away from a great focus on the network to becoming more data-conscious," says John Colley, CISSP, Managing Director for (ISC)2 EMEA. "Overall, companies are adopting a comprehensive approach, with a breadth of technologies addressing a wider set of needs."

Top 10 technologies deployed in the entire organisation:.

* Firewalls (92%)
* Physical Security (79%)
* Intrusion Detection (78%)
* Business Continuity and Disaster Recovery Solutions (73%)
* Identity and Access Management (73%)
* Change Management (69%)
* Incident Management (67%)
* Configurations Management (66%)
* Cryptography (66%)
* Database Security (65%)

Four years of findings from the Global Information Security Workforce Study, the only study of its kind tracking international workforce trends in information security, illustrate a significant change in organisational acceptance and management of information security risks. Conducted by industry analysts since 2004, the study regularly reviews the skills professionals are working to attain, education levels, experience, growth, reporting lines and accountability, salary trends, budgets, training demand, top technologies being deployed and how professionals spend their time. Trends and differences are illustrated on a global, regional (Americas, Europe and Asia) and country basis. Full results will be released on Tuesday 22nd April at Infosecurity Europe in the keynote theatre at 15:45.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo