ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Challenges of Securing Applications in Enterprises



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

The more important the organization, the bigger the challenge for the hacker, and the bigger risk of being hacked. Hackers have been increasing their sophistication by raising the mitigation level. User mobility and globalization of the enterprise environment pose another challenge as traditional security is bypassed.

In recent years the mobility of companies in the global environment has generated another layer of security risks. There has been a significant increase in the number of incidents of attacks through Social Engineering, where users are victims of a lack of knowledge and a lack of validation.

A new technology approach is required to mitigate the new levels and sophistication of hackers by deploying automated behavioral based application level attacks protection that analyzes both requests made towards the protected applications and clients, and the replies returning in response to these requests.

Employees must be constantly educated not to open e-mails from unknown senders and to question any link before they click. The bottom line is that they need to understand that no one really offers anything for free.


Mark Clancy Mark Clancy
EVP IT Risk Technology, Citigroup

Read More