{"id":151,"date":"2006-09-18T00:00:00","date_gmt":"2006-09-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/18\/gartner-security-costs-fall-with-good-policies\/"},"modified":"2021-12-30T11:36:36","modified_gmt":"2021-12-30T11:36:36","slug":"gartner-security-costs-fall-with-good-policies","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/18\/gartner-security-costs-fall-with-good-policies\/","title":{"rendered":"Gartner: Security costs fall with good policies"},"content":{"rendered":"<p>Think in terms of threats, not regulations, analysts counsel.  Enterprises will increasingly face skilled IT criminals trying to infiltrate corporate networks for sensitive data stored in databases, but adopting new policies to evaluate risk should help drive the cost of defense down, computer security analysts said.  But many corporations are creating security policies based on government regulations rather than threats.  The result is policies that meet the auditors&#8217; requirements but aren&#8217;t necessarily best for the overall security, said Jay Heiser, Gartner research vice president.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rather than trying to anticipate a new regulation, it&#8217;s better for companies to treat regulation as one more factor in an overall risk portfolio, Heiser said.<\/p>\n<p>From its latest data, Gartner expects information security budgets to increase 4.5 percent over the next year.<\/p>\n<p>Wheatman said companies have shown success in negotiations with security vendors in getting, for example, antispyware included with antispam and antivirus software instead of paying extra.  Antivirus software represented 54.3 percent of the revenue, at $4 billion.<\/p>\n<p>http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;taxonomyName=security&#038;articleId=9003402<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-151","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/151\/revisions"}],"predecessor-version":[{"id":2638,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/151\/revisions\/2638"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}