Data Privacy and Security

Evolving Threats and Data Security Management in the UK

Provided by Proofpoint

Category Data Privacy and Security

Type White Paper

Length 12

Publish Date February 22 2016

Date posted February 29 2016

Overview

The majority of current security systems in the UK are focused on perimeter protection – stopping malware getting past network and firewall defenses and into internal systems, despite potential threats arising from insider system abuse, misuse and data leakage. Based on interviews with IT decision makers in the UK, this IDG Connect report from Proofpoint looks at how organizations currently manage data security requirements, and gauge how well established defenses, policies and processes stand up to future challenges.

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?