| | April 20166CIOReviewCopyright © 2016 CIOReview. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.CIOReviewAPRIL- 06 - 2016Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.402.1463, F:510-894-8405 APRIL- 06 - 2016, Vol 05 SE-23 Published by CIOReview To subscribe to CIOReviewVisit www.cioreview.com ENTERPRISE SECURITY SPECIALCIOReviewEditorial StaffSalesT:510.565.7627Alex D'Souza Joshua Parker Shirley FaithFrank Collins Shashikanth PeetlaSophia AndersonGeorge Thomasgeorge@cioreview.comVisualizersStephen ThomasManaging EditorJeevan GeorgeContributed by the blurring work floor boundaries, security takes the top position among myriad challenges faced by enterprise CIOs today. Remote work options, BYOD, outsourcing, online customer interactions, and adoption of new technologies like cloud, social, big data, and mobile are all expanding the operational perimeter of enterprises that need to be secured. Though private and government sector organizations are spending billions of dollars on bolstering security, cyber criminals are still finding their way forward. The recent spate of data breaches at major U.S. corporations has again brought the focus back on the effectiveness of the security tools deployed to counter emerging threats. The results of the 2015 global IT Security Risks survey conducted by Kaspersky Lab in cooperation with B2B International hold more dramatic security revelations. Over 90 percent of the 5500 companies from 26 countries involved in the survey admitted of experiencing security incidents. Additionally, 46 percent of businesses revealed losing their sensitive data to an internal or external security threat. On an average, large enterprises spent approximately $551,000 to recover from a security breach and SMBs parted away $38,000 for the same. In addition, the indirect costs for enterprises were $69,000, and $8,000 respectively. As a result, the forward thinking CIOs are recognizing the need to be protected by an agile security strategy that proactively addresses challenges rather than just reacting to the series of tactical responses to handle specific threats or legal requirements. This means that the effective security lies in a holistic approach--the one that involves people as much as technology.Our goal with this special edition is to help companies discover best-of-breed enterprise security solution providers who can help safeguard an enterprise's digital assets. This edition blends thought-leadership from subject matter experts with real stories on what selected vendors are doing for their clients, including exclusive insights from CIOs and CXOs. Let us know what you think.Jeevan George Managing Editoreditor@cioreview.comEditorialSafeguarding the Digital Enterprise K.Manoj Kumar
<
Page 5 |
Page 7 >