The importance of protecting your key intellectual assets and confidential reports is critical in today's economic environment. I recently spoke with Johnnie Konstantas, VP of marketing for Varonis. With all of the requirements regarding compliance and new regulations being instituted by government agencies in 2009, the importance of automating and monitoring access to key documents is of the highest priority. Also, the ability to limit access to employees that have been terminated is just as important. Following are 5 security predictions for 2009 from Varonis:
Automation is essential - a tough economy usually means being asked to do more with less. While IT departments tend to traditionally run lean, hiring freezes are likely to extend here as well. This potentially means that IT operations directors will take a look at processes and tasks that are essential but labor intensive, and look for ways and technology by which to automate the functions. This type of spend is likely to get approval especially if payback is quick.
Efficiency over innovation - efforts aimed at increasing employee productivity and getting more from existing investments will definitely have an audience. These are good times for companies to offer customers tutorials and guidance on getting more from the functions of installed technology, especially if those functions help them save time.
Expenses must map to business benefit - while some new technologies and projects may be approved, it's almost a certainty that all new IT expenses have to show clear return on investment. Business managers will need to see short-term time savings in both time and money before approving any expense - even those requisite for operating the business.
Transparency to asset use - incidents of data loss and misuse have been on the rise and likely to increase with layoffs and job insecurity, which has increased in regard to the economic downfall and will continue to increase in 2009. Companies are mandating greater protections for information assets and asking IT personnel to show proof of measures taken to that end. Organizations too are looking to implement processes that charge data stewards with the continuous monitoring and safekeeping of critical company information.
Risk mitigation is good enough - while most organizations aim at 100% data loss prevention, during a downturn business managers must weigh cost of protection against acceptable risk. Measures that significantly reduce risk and provide adjunct operational benefits will be preferred to strictly preventive solutions with lengthy implementation time frames.
Posted January 30, 2009 1:28 PM
Permalink | No Comments |