{"id":3448,"date":"2013-04-24T10:01:02","date_gmt":"2013-04-24T17:01:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3448"},"modified":"2013-04-25T13:28:02","modified_gmt":"2013-04-25T20:28:02","slug":"for-your-consideration-data-center-security-spend","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/04\/for-your-consideration-data-center-security-spend\/","title":{"rendered":"For Your Consideration -- Data Center Security Spend"},"content":{"rendered":"<p>IT budgets remain a concern for the enterprise, and data centers are often one of the most costly items. Faced with daunting costs, security is often allocated as an afterthought. However, choosing the right network security solution can be \u201cbudget smart\u201d and lead to increased productivity and efficiency down the road.<\/p>\n<p>In my latest SecurityWeek article, I outline the top five things to consider when determining how to invest in data center security. Ranging from prioritizing the right form factor for network security to ensuring your team is properly trained, these tips will ensure you take the best approach towards data center security without breaking the bank. Read more <a href=\"http:\/\/www.securityweek.com\/top-five-things-consider-your-data-center-security-spend.\" rel=\"nofollow,noopener\"  \">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT budgets remain a concern for the enterprise, and data centers are often one of the most costly items. Faced with daunting costs, security is often allocated as an afterthought. However, choosing &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75],"tags":[12,141],"coauthors":[771],"class_list":["post-3448","post","type-post","status-publish","format-standard","hentry","category-data-center-2","tag-data-center","tag-it-budget"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3448"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3448\/revisions"}],"predecessor-version":[{"id":3453,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3448\/revisions\/3453"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3448"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}