sponsored by ComputerWeekly.com
Posted:  21 Oct 2011
Published:  27 Jan 2011
Format:  PDF
Length:  12  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Poor IT security has led to some high-profile data breaches. Originally, much IT security was provided by specialist suppliers, but today more and more of it is incorporated in the IT infrastructure. Buyers must make sure they have in place a coherent IT security strategy across all their IT assets with the ability to manage it. Putting sensitive data in the cloud will only be a real option for organisations when ser vice providers can guarantee bet ter securit y than the organisation can itself, or of fer the same level of securit y at a lower cost. This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.






BROWSE RELATED RESOURCES
Cloud Security | Security | Security Architectures | Security Best Practices | Security Management | Security Systems

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement