BOSTON, MA--(Marketwire - January 11, 2011) - Aberdeen, a Harte-Hanks Company (
Aberdeen's research confirms the ubiquity of traditional network firewall technologies, which have been deployed by virtually 100% of all respondents. But the research also makes it clear that most companies have augmented their network firewalls -- because so many paths have been opened through them -- with complementary technologies that are designed to address what the traditional firewalls cannot, e.g., intrusion detection / prevention solutions on the network, and anti-virus / anti-malware solutions at the endpoints. And yet the traditional, signature-based approach for these complementary technologies is under significant stress in its own right. The approach of determining what is "good" by detecting and subtracting what is known to be "bad" is increasingly giving way to the alternative approach of establishing what is known to be "good" and moving forward from there.
Successful initiatives to secure network access in today's dynamic environment require capabilities to address the following basic questions: What devices are on our network? Which end-users are on our network? Prior to connection, are the devices and end-users in compliance with our established policies? Post-connection, have the devices and end-users sustained compliance with our established policies? Do we have enterprise-wide visibility into the current status of our network devices, endpoints and end-users, a common management view of relevant information and events, and the ability for automated enforcement of policies?
"The enterprise border or perimeter should be thought of as the virtual boundary that separates the IT infrastructure over which the organization has -- or should have -- visibility and control, and the IT infrastructure over which the organization does not have visibility and control," commented Derek E. Brink, vice president and research fellow for IT Security, Aberdeen Group. "Note that having visibility and control over resources does not necessarily imply having ownership of those resources, however, as in the examples of cloud computing or employee-owned mobile endpoint devices."
To obtain a complimentary copy of the report, visit: http://www.aberdeen.com/link/sponsor.asp?spid=30410182&cid=6042&camp=2.
To take a complimentary, easy-to-use interactive assessment that can help you to identify the strategies, capabilities, and technologies used by companies with top performance in the area of application security, visit: http://assessment.aberdeen.com/MZPSkjwil1/index.aspx.
Visit Aberdeen.com for additional access to complimentary IT Security Research.
To view complimentary 30-minute webcasts highlighting findings from this and other Aberdeen IT Security research, visit www.brighttalk.com/channel/290.
About Aberdeen Group, a Harte-Hanks Company
Aberdeen provides fact-based research and market intelligence that delivers demonstrable results. Having queried more than 30,000 companies in the past two years, Aberdeen is positioned to educate users to action: driving market awareness, creating demand, enabling sales, and delivering meaningful return-on-investment analysis. As the trusted advisor to the global technology markets, corporations turn to Aberdeen for insights that drive decisions.
As a Harte-Hanks Company, Aberdeen plays a key role of putting content in context for the global direct and targeted marketing company. Aberdeen's analytical and independent view of the "customer optimization" process of Harte-Hanks (Information - Opportunity - Insight - Engagement - Interaction) extends the client value and accentuates the strategic role Harte-Hanks brings to the market. For additional information, visit Aberdeen or call (617) 854-5200, or to learn more about Harte-Hanks, call (800) 456-9748.
(C) 2010 Aberdeen Group, Inc., a Harte-Hanks Company
451 D Street, Suite 710
Boston, Massachusetts 02210-1928
Telephone: (617) 854-5200
Fax: (617) 723-7897
www.aberdeen.com