- Hacktivism, data privacy and business/IT gap impact enterprise IT
Regulatory compliance will be the top business issue affecting enterprise information technology (IT) in the next 12 to 18 months, according to a major new ISACA member survey of more than 2,400 IT, security, and audit and assurance managers from 126 countries worldwide.
- KRISTEN KESSINGER
- InfoSecurity
- Posted On

Discovering where unsecure, sensitive information resides on networks is a key factor in shaping and determining successful data protection strategy. Lack of visibility into critical data assets can leave organisations exposed to significant risks. Many well documented cases of critical data leakage only serve to highlight the consequences for organisations; including criminal and civil litigation, reputational and brand damage in addition to hefty financial implications.
The physical access control market has long been characterized by what HID Global has called the “customer value equation” -- a balancing act between cost, security and convenience that influences customer buying criteria and decision-making tradeoffs. Validated by a recent AVISIAN research study, this “balancing act” will continue over the coming years. However, there are new market dynamics that influence and change the interrelationship between the customer value equation factors, and new areas of consideration that present trade-offs with potentially compelling advantages.


