IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    
Webinar
Performance or Security? Why Not Both? Resolving the Network Security Balancing Act
Date: 05/03/2011 Length: 60 minutes Cost: $0.00

            Linked In    

Abstract:

Additional Speaker: 

>>Joe Anthony, Director of Product Management for Security, Risk and Compliance, IBM

Organizations recognize the need to integrate security into the fabric of their operations. They also recognize, however, that this means devoting resources to security that might otherwise be available to optimize resource performance. This is no small matter, when seconds (or less) count.

This has long been a challenge with the integration of security into operational environments such as network infrastructure. Inline defense is often a primary means of protecting sensitive resources such as critical applications and corporate networks, but if these measures negatively impact performance, does the business ultimately win?

Today, that question is complicated by a growing range of security challenges that raise the stakes on network security:

>>A wider range of applications and services is growing—and not just in the data center. Endpoint applications further raise the stakes on defense, compounded by a growth in non-traditional endpoints such as smartphones and Web-based applications.

>>Threats and vulnerabilities alike have not only mushroomed in number, but have become even more challenging than before, with more sophisticated attacks demanding more of content inspection for security

>>These factors lead to greater demands on security functionality in the network. But what does this mean for security performance?

Join EMA Research Director Scott Crawford and IBM Director of Product Management for Security, Risk and Compliance Joe Anthony for this Webinar where they will:

>>Identify network security challenges

>>Explore how IBM technologies help solve these challenges

>>Highlight how performance-enabled security convergence defines the next generation of network security

>>Teach organizations how they can achieve both security and performance across a wide range of demands


 
Please note that this is a sponsored event and EMA shares registrant information with the sponsor.

IBM and its affiliates may use the information you have provided to keep you informed about IBM products, services and offerings.

IBM's Online Privacy Statement

Author:

Scott Crawford, Former EMA Analyst

View Transcript

 




EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2014 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show