PRO+ Premium Content/Business Information
Access your Pro+ Content below.
Data integrity protection spurs greater security spending
This article is part of the Business Information issue of April 2018, Vol. 6, No. 2
Data managers find themselves working against the clock to mine significant value from the floods of incoming data filling their lakes beyond capacity. Rest assured, their companies are well aware of the uphill battle they face in turning all that information into gold and providing a competitive advantage. As a result, big data and business analytics top the list of broad business initiatives this year, according TechTarget's "2018 IT Priorities Survey" of North American companies. Specifically, their planned software purchases include cloud-based applications, business analytics and intelligence, big data processing and management, data integration, artificial intelligence and data visualization. Dramatic rise seen in security spending To improve data integrity protection inside and outside companies, another kind of software figures prominently in 2018 corporate spending plans. Gartner estimated that worldwide enterprise security spending will reach $96 billion this year -- an 8% increase over last year. Security services ...
Features in this issue
-
GDPR requirements put focus on data ethics, governance
The General Data Protection Regulation makes privacy paramount and reinforces the practice of good data governance. Will a new focus on data ethics be an important side effect?
-
Data integrity protection spurs greater security spending
As hacking, ransomware and malware attacks mount, companies place big data protection and integrity among the primary reasons for increased spending on security software.
Columns in this issue
-
U.S. data protection laws fall short in the age of big data
Data breaches and a history of data abuse led the EU to adopt GDPR, but it might take massive scale data security crises for the U.S. to legislate similar data protection laws.
-
IoT, edge computing spawn new security issues
As real-time big data increasingly hitches up to internet of things, edge computing power and fog nodes, a whole new layer of security threats emerges.