Click here to close now.


News Feed Item

Aberdeen Group Publishes IT Security, Financial Management and GRC Research

Research Examines Managed ERP, Professional Services Automation, Agile Project Management, Enterprise Performance Management

BOSTON, MA -- (Marketwired) -- 05/09/13 -- Aberdeen Group, a Harte-Hanks Company (NYSE: HHS), today announced the publication of new research reports from its IT Security, and Financial Management and GRC research practices.

Recently, a leading government agency published analysis that suggests that just four specific endpoint security controls would have successfully protected against at least 85% of cyber intrusions they actually experienced. The first of three research reports authored by Vice President and Research Fellow Derek Brink, leader of the Aberdeen Group IT Security research practice, "Virtual Patching and Database Security: An Effective Compensating Control," confirms that patching promptly is part of highly effective approaches to managing vulnerabilities -- but notes that patching is not always practical or even possible, which is why many companies look to virtual patching as an effective compensating control. One prime example: virtual patching in the context of database security. To access a complimentary copy of this report, please visit

"Protecting Your Intellectual Property: It Starts with a Single Click" notes that when it comes to protecting your organization's confidential information and intellectual property, a single click by a single enterprise end-user can lead to compromise -- or it can result in greater protection and control. Aberdeen's research shows that involving the end-user in data classification at the time of content creation, and automating the application of technical controls such as encryption or rights management at the time of content publication, are more likely not only to reinforce established security policies, but also to transform end-user behavior and create a sustainable corporate culture regarding data protection over time. To access a complimentary copy of this report, please visit

The report "Best Practices in Managed File Transfer" notes that file transfer should provide the secure, reliable means to support collaboration between individuals, and to integrate business processes within (and between) enterprises. It sounds so easy, but a detailed look at your enterprise file transfer activities will likely reveal multiple modes and multiple use cases already in place, implemented with a hodge-podge of digital "do-it-yourself" approaches. A customer case-in-point describes how global banking and insurance services leader ING Group elevated file transfer from a tactical problem about encryption and protocols, to a more strategic, holistic solution for a core business process with multiple use cases -- with appropriate security and reliability designed in. To access a complimentary copy of this report, please visit

"Big Data Visibility and Analytics for Cyber Security," a video from Derek Brink, describes how leading companies are augmenting their traditional approaches to IT Security, which are primarily reactive and forensic (i.e., an investigation of "what happened, and why"), to also incorporate a more real-time and predictive capability (i.e., the ability to identify, contain and respond quickly to "what is not normal"). Technologies that help companies make better use of the incredible volume of data that is already being generated by their IT infrastructure include log management, security information and event management, and security intelligence / analytics -- the objective of which is to capture and integrate the data, analyze and get insights from the data, and ultimately to act on the insights for the benefit of the business. For a complimentary viewing of this video, please visit:

"Risk Management through Effective Financial Planning, Budegting, and Forecasting," written by Ankita Tyagi, Research Analyst for the Aberdeen Group Financial Management and Governance, Risk, and Compliance (GRC) research practice, explores the connection between financial planning, budgeting, and forecasting (FPBF) and risk management. Specifically, are organizations with a sound FPBF strategy also adept at mitigating risk? This report answers this question by comparing companies reporting reduction in risk exposure by 10% or more to companies reporting increased in risk exposure by 1% or more, over the past year. For an in-depth look at this topic, please view a complimentary copy of this report at:

About Aberdeen Group, a Harte-Hanks Company

Enabled by its team of 40 research analysts covering 16 industry-sector categories, access to 35,000+ benchmarked enterprise decision makers, and 2.5 million research readers, Aberdeen Group -- a Harte-Hanks Company (NYSE: HHS) -- is the trusted advisor to global technology markets, providing corporations with insights that drive IT decisions. Aberdeen's independent, fact-based research and market intelligence is used by the Fortune 1000, Global 500, and Software 500.

Aberdeen has offices in Boston and London. Harte-Hanks operates 25 offices in the United States, and has locations throughout Asia-Pacific, Europe, and Latin America.

© 2013 Aberdeen Group, Inc., a Harte-Hanks Company
451 D Street, Suite 710
Boston, Massachusetts 02210-1928
Telephone: (617) 854-5200
Fax: (617) 723-7897

Add to Digg Bookmark with Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...