Information security technologies as a commodity input
暂无分享,去创建一个
Purpose – The paper provides a pragmatic evaluation of the value that security technologies deliver to businesses. It contains recommendations for how businesses can best view the role of security technologies within an information security program.Design/methodology/approach – The findings in the paper are derived from the observations of the author in his role as an information security consultant working for businesses in numerous vertical markets over the period of the last several years.Findings – The principle finding in the paper is that the market for information security technologies is becoming a commodity market. This change will create a shift in how businesses view security technologies, as they will begin to focus on achieving security capabilities at the lowest possible cost. The processes of commoditization will also force security vendors to find new ways of doing business.Practical implications – The paper makes several recommendations for how businesses should evaluate, acquire, and use...
[1] F. Billari,et al. does it matter? , 2007 .
[2] Clayton M. Christensen. The Innovator's Dilemma , 1997 .
[3] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[4] Andrew Stewart,et al. On risk: perception and direction , 2004, Comput. Secur..