Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Information security: Why are prevention-only approaches so obsolete?

Of course, this has always been true, but it seems even more so today: The belief that organizations can consistently defend their enterprise systems from attack is outdated. In the past year or so we’ve all read or heard reports of retailers, government agencies, high-tech firms, oil and gas providers, financial services organizations, and other types of enterprises having suffered from significant data breaches.

 

MSS Gartner Report.JPGWhy have attackers been successful?

In our recent newsletter Managed Security Services: A Force Multiplier, created in conjunction with Gartner, we examine the enterprise trends that are making these types of incidents more prevalent, and why attackers have been successful regardless of the multitude of security defenses and processes enterprises have put in place.

 

Data has so many places to travel

Some of those challenges include the complexities of securing data on mobile and various cloud platforms and hybrid architectures in place at enterprises today. And I think we summed these challenges up in the newsletter quite well:

 

“… The business-technology infrastructures that security teams must grapple to secure are growingmore complex. Today, data has more places to travel than ever before: between privateand public clouds and legacy infrastructures, desktops, notebooks, and the numerous mobile devices used by each worker. Its no wonder that enterprises are unaware where their critical data reside, let alone how to constantly protect it… .

 

A good managed security services provider (MSSP) can fill the gaps in your security operations. Even with the increased spending on security these days, most enterprises don’t have enough time or in-house talent to cover the growing demand. It simply consumes too many valuable resources to stay abreast of the latest threats, technologies, and regulatory compliance issues.”

 

globe touch-smaller.jpgPrevention-only approaches are now obsolete

In addition, the Gartner research included in the newsletter, Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence, provides insight into how current attacks make prevention-only approaches obsolete, and why information and people-centric security strategies will be necessary. Certainly, with the demand for security personnel at an all-time high, it would be the rare enterprise that had all of the talent it needed around the clock to adequately respond to what we believe to be the inevitable.

 

Read the full story in the HP-sponsored Gartner newsletter, Managed Security Services: A Force multiplier. Identify security gaps and fill them before malicious attacks can affect your organization.

 

About the author

Jeff Misustin.jpgJeff Misustin, Global Marketing Manager for Enterprise Security, has close to 20 years of experience with Hewlett-Packard in all facets of IT services and security: sales support, account management including the U.S. public sector, applications services, worldwide product management, and, most recently, product marketing for Enterprise Security.

 

Related links

www.hp.com/services/security

Managed Security Services Overview: Get Help (699 KB)

[Video] HP Managed Security Services: Extend your security (2:58)

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation