> Research Library > Tripwire > Continuous Monitoring: Responding to New Threats and More Complex IT Envionments
 

Continuous Monitoring: Responding to New Threats and More Complex IT Envionments

White Paper Published By: Tripwire
Tripwire
Published:  Feb 08, 2013
Type:  White Paper
Length:  13 pages

Today’s information-driven organizations face the fundamental challenge of balancing high availability of business-critical information with maintaining its integrity and security. They must do this in spite of an increasingly complex IT environment that often includes traditional physical infrastructure, virtualized infrastructure and cloud computing. Other factors further complicate this challenge. Gartner predicts information storage to grow from 40 percent to 60 annually, while new variants of malware, such as polymorphic attacks that evade anti-virus software and intrusion vectors like web attack toolkits, grow exponentially—into the millions. It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.



Tags : 
high availability, cloud, security, hacker detection, intrusion prevention

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee