ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Kara Hayes, Americas Market Development, Nokia Talks Security



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

Kara Hayes of Americas Market Development, Security Product Group, delves into the importance of secure IT. Network security has long been accepted as a critical part of the IT infrastructure required by small, medium and large enterprises today.

Previously, a firewall and desktop anti-virus might have been enough to quell the fears of IT professionals, but as the reliance on webified applications and the Internet in general increases, threats to these enterprises have become more complex and designed specifically to circumvent the traditional security measures in place.

Security breaches vary greatly depending on the customer, business model and network.

Companies that connect to a large number of external partners would be more than likely to see threats coming from the ?unknown? partner entity than companies that do not allow such entities to connect to their work.

Security is driven by the new kids of applications that businesses deploy and the new ways of working in a mobile environment. As such security threats will target new applications through the web, instant messaging or video.

They would also target new kinds of devices or operating systems that are becoming more popular in the corporate space.