You are here: IT-Observer » Articles » Editorial RSS | White Papers |   

Calculate Security and Compliance Cost, Benefits





New tool assists IT organizations in establishing financial benchmarks that quantifies the cost of security breaches. According to Apani Networks, the goal of the Compliance IT Security Cost/Benefit Calculator is to help organizations develop a view of the financial benefits of the required improvements to network security demanded by the regulatory environment.

Initially, an organization can use the default values within the calculator to establish their current IT cost structure for security. As they review their process, further refinements with more specific company data will enable a clear view of the costs to the IT organization.

As they create IT security compliance strategies and identify their potential impact to productivity and tangible costs, new data can be used to provide a calculation of the financial benefits of implementing security that closely reflects actual financial impact. This enables organizations to create "what if" scenarios and to validate potential compliance strategies by creating a snapshot of the potential benefits associated with each one.

The Compliance IT Security Cost/Benefit Calculator shows the cost savings associated with productivity gains in security management, compliance management, and mitigating security risks with a long term view. It is customizable by industry, country, local costs, and currency and no user data is stored by Apani in any form. Default values are regularly updated and taken from IDC and Alinean research.

"It seems like everyone is talking about how to add and use security technology for compliance without any real clear understanding of the financial impact associated with it," said David M. Lynch, vice president of marketing, Apani Networks.

"This Compliance IT Security Cost/Benefit Calculator contains tangible and intangible benefits to provide an assessment of the potential return on IT security compliance spending. The results are completely private and organizations can come back to the calculator as often as needed to update and fine-tune their requirements and planning."



Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

Latest News

Essential Bluetooth hacking tools
25.05.07  Bluetooth provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires.

DEP for IE7 in Vista
22.05.07  Security tips blog, security-hacks, has posted details on how to enable DEP for Internet Explorer 7 in Vista.

SMB over SSH: Secure File Sharing
18.05.07  Security tips blog, security-hacks, has published an simple guide to share files securely in heterogeneous networks.

Avoid data leaks by clearing the page file
14.05.07  Security-Hacks publishes a useful tip to avoid potential data leaks when you run out of memory.

How to set Master Password in Firefox
11.05.07  Nowadays many web sites require you to type a user name and password before you can enter the site.

How to test your firewall?
10.05.07  Security tips blog, Security-Hacks, has published a compilation of tools to test your firewall: "We’ve compiled a list of tools we believe will be of value to both home users and advance users.

eEye released integer overflow auditing tool
16.02.07  Vulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter