News round up: What's going on in enterprise tech?

May 12th, 2014 / Category: Managed File Transfer

Are you up on the latest trends and news in enterprise technology? Here are five of the latest conversation starters from around the Web:

One size might not really fit all 
Recent Forrester research revealed that the corporate computing landscape is diversifying—including within organizations—Computerworld reported. While this presents potential challenges for IT teams, it could be a great boon to performance and productivity. The news source noted that different tools and devices might be more appropriate for various roles, which means that a more varied offering could help employees access the specific resources they need. Part of this trend is an increasing focus on making the workplace more mobile.

Data breaches might be more costly than you think 
According to the Ponemon Institute's ninth annual Cost of Data Breach Study, breaches amounted to a whopping $3.5 million worth of damages, which is 15 percent higher than last year, Infosecurity Magazine explained. However, analysts believe the consequences cut even deeper than the average $145 per record that the Ponemon Institute identified. The source emphasized the importance of taking network security seriously and implementing solutions to raise awareness and prevent breaches. 

Getting employees on board with data security 
On a similar note, Fierce CIO emphasized the importance of training team members to be "IT security stewards." Noting that recent research pointed to the role of employee behavior and mistakes in cybersecurity incidents, the source posited that educating workers to identify and guard against possible breaches, leaks, or attacks could prove a valuable counterpart to investments in data security measures, such as secure file sharing tools.

Businesses need robust collaboration tools 
Computerweekly highlighted the need for "secure and seamless collaboration tools" that enterprises can use to work with their business partners and suppliers more effectively. Suggesting that CISOs should be "enabling partner[s]," not controlling forces, the source explained that controls should be kept as close to the data as possible. In other words, the tools should automate security strategies, such as encryption, metadata-based protection, and standardization. With the right resources, employees can be free to focus on the business aspects of their collaborative relationships.

Information security companies differ over the fate of antivirus 
Kaspersky and Symantec disagree over whether antivirus software remains an important component of network security, Tech Times reported. Symantec Senior Vice President for Information Security Brian Dye stated that "antivirus is dead," advocating that efforts should instead be directed toward identifying hackers or intruders and containing the damage they could inflict. Answering this claim in an email to The Inquirer, Kaspersky Lab's Eugene Kaspersky acknowledged that a "single-layer, signature-based virus scanning" isn't sufficient on its own, but asserted that antivirus programs do and will continue to hold an important role in network protection. Where do the two sides agree? Information security requires a multi-pronged approach and must remain an ongoing dialogue.