Tuesday, July 8, 2014

Jason Atchley : Data Security : Gartner Lists Top 10 Most Important Security Technologies

jason atchley

Gartner Lists Top Info Security Tech

Gartner lists top 10 most important information security technologies.
, Law Technology News
    | 0 Comments

Gartner Inc. revealed a list of the top 10 information security technologies for 2014 at its Security and Risk Management Summit, held from June 23-26 in National Harbor, Md. 
Although Gartner is known for its lists of technology trends, the June list focused specifically on “real” technologies that can be purchased or ordered through a vendor, said Neil MacDonald, vice president and Gartner fellow. The list was also the first for the Stamford-based IT research and advisory firm that honed in on security tech.    
For a technology to be listed, it must be relatively new, MacDonald said, and could not be widely adopted (e.g., password management). The listed technologies also had to “enable” either social, mobile, cloud or Big Data (dubbed the “Nexus of Forces” by Gartner), said MacDonald.
Eighty analysts from the Gartner Security, Privacy and Risk Research team were polled to compile the list during a two-week period from April 15 to April 30.
Security technologies, such as a cloud access security brokers (No. 1 on the list), are important for law firms, MacDonald said. CASBs can monitor users as they access cloud-based resources (e.g., Dropbox), said MacDonald, to look for sensitive data leakage, or inappropriate protection of law firm data. CASBs are defined by Gartner as “cloud-based security policy enforcement points."
“I think cloud access security brokers will become more commonly used as more firms move some of their applications to the cloud,” said John Roman, director of IT operation and e-discovery at Nixon Peabody. “This type of technology adds an additional layer of security that the firm’s IT department can control, thus relying less of the cloud service provider’s internal and external security controls alone.” 
Other top information security technologies on the list include: adaptive access control, which allows users to access information based on the context of the request (trust vs. risk); endpoint detection and response, which protects cyberattacks aimed at desktops, servers, tablets and laptops; interactive application security testing; and Big Data security analytics.
Within the next six years about 40 percent of enterprises will establish a “security data warehouse” to store their “continuous monitoring of all computing entities and layers,” said a Gartner press release announcing the list.   
“Information security technologies are a matter of best practices, and I daresay in most states a matter of regulation and state bar requirements,” said Ward and Smith CIO Chris Romano, regarding the recent Gartner list.
Ward and Smith uses information security technologies such as firewall and end-point (e.g., computers, peripherals, mobile devices) technologies, and is “looking into getting more intrusion detection,” Romano said.



Read more: http://www.lawtechnologynews.com/id=1202662166175/Gartner-Lists-Top-Info-Security-Tech#ixzz36sc4QJD9


No comments:

Post a Comment