Note: this blog is a mirror of my HP Labs Blog, on the same topic, accessible at: http://h30507.www3.hp.com/t5/Research-on-Security-and/bg-p/163

Wednesday, February 18, 2009

IAM and top IT initiatives in 2009

This article, called “Encryption top IT Security Initiatives in 2009”, provides an overview of a recent Forrester’s report, about IT security spending in 2009:

“Full-disk encryption was cited as the top client security technology

The survey's respondents also indicated interest in deploying identity and access-management (IAM) technologies, particularly single sign-on, unified monitoring of users' rights and activities and provisioning. The main reason given for adopting IAM was security and governance along with regulatory compliance. Among the technologies least anticipated to be piloted or adopted is application lockdown for endpoint control”

--- Posted by Marco Casassa Mont (here and here) ---

--- NOTE: my original HP blog can be found here ---

Monday, February 9, 2009

AICPA’s Top Technology Initiatives Survey – Information Security Management

AICPA has released the 2009 Top Technology Initiatives Survey results:

“The initiatives included in the survey are intended to represent the CPA’s unique perspective regarding the initiatives they believe will impact financial management and the fulfillment of other fiduciary responsibilities such as safeguarding of business assets, oversight of business performance, and compliance with regulatory requirements.”

Based on this survey, these top 10 ten technology initiatives are:

1. Information Security Management
2. Privacy Management
3. Secure Data File Storage, Transmission and Exchange
4. Business Process Improvement, Workflow, and Process Exceptions Alerts
5. Mobile and Remote Computing
6. Training and Competency
7. Identity and Access Management
8. Improved Application and Data Integration
9. Document, Forms and Content Knowledge Management
10. Electronic Data Retention Strategy

Additional details can be found here.

--- Posted by Marco Casassa Mont (here and here) ---

--- NOTE: my original HP blog can be found here ---