Seems security has been high on everyone’s list of priorities this week with FaceTime releasing its Socialite software to secure social networks, and HP buying Fortify to add application security at the blueprint stage. Not surprising though, after recent research from Gartner showing security software is a priority for enterprises.

FaceTime Tackles Social Networking Security

For those concerned about compliance and security issues related to the use of social networks in the enterprise, unified communications and web 2.0 specialist FaceTime (news, site)  has just released Socialite, on-premise, or SaaS software that provides granular control of applications including Facebook, LinkedIn and Twitter.

Apart from the fact that the SaaS version is relatively cheap and should be well within the reach of SMBs, enterprises can also deploy a hybrid version that will use it as an enterprise module of FaceTime's Unified Security Gateway, while at the same time offering the SaaS version for monitoring remote workers.

With Socialite, enterprises are offered a list of extended content controls for more than 1000 social networks to ensure compliance with a long list of regulations, while for the three key social networks of Facebook, LinkedIn and Twitter, Socialite has 95 different content and activity features including identity management and data leak prevention.

And more to the point, it’s cheap. Socialite is available as a yearly SaaS subscription starting at US$ 12 per user up to 100 and on premise for US $ 5,000 for 100 users. In larger companies this is obviously going to multiply, but think how much the alternative could potentially cost.

HP Buys Security Vendor Fortify

More security, this time from HP (news, site), which has just announced the acquisition of security assurance vendor Fortify (news, site) for an undisclosed price.

The deal is no real surprise as they have collaborated before on a number of projects including the release of the advanced security analysis software Hybrid 2.0 in February, and  then there have also been rumors for months that the acquisition was on the cards.

With Fortify, HP can build enterprise application security programmes from the ground up rather than adding them as an afterthought and in doing so create far more robust security systems across entire application lifecycles.

It will be able to accelerate development of this technology to give clients the accuracy and prioritization they need around security vulnerabilities to build scalable enterprise application security programs.

In short, it means that using Fortis security can be added from the ground up and into the blueprints of the application from the very start.

Once the deal is closed, Fortify and its management team will be gradually absorbed into HP’s Software and Solutions business with its products becoming part of its Business Technology Optimization application portfolio. However, initially Fortify will remain as a standalone to ensure support for existing customers.

Security Spending Is Priority

Security just wouldn’t be security without figures and statistics. As if to underline the growing importance of security in GRC, Gartner (news, site)  has just released some new figures that shows w worldwide security software revenue is forecast to surpass US$ 16.5 billion in 2010, an 11.3 percent increase from 2009 revenue of US$ 14.8 billion.

While the recent economic crunch hit security too spending still managed a respectable 7% increase in 2009 over 2008  with many companies indicating that they would also be spending as soon as finances settled down a bit.

Not only that, but Ruggero Contu, principal research analyst at Gartner reckons that security spending is going to the biggest growth area in enterprise software spending in the coming years:

Most segments of the security software market will continue to grow over the next few years, although a significant degree of variation is expected between the more-established and less-mature technologies . . . Overall, security will remain one of the fastest-growing areas within the enterprise software market," he said.

Contu also believes that security software vendors that have a broad mix of channels including licensing and maintenance, as well as SaaS and open source products will have a better chance of riding the growth wave.

If you want to find out more the report Forecast Analysis: Security Software Markets, Worldwide, 2009-2014, 2Q10 Update is on the Gartner website for US$ 1295.

RenewData Releases Key Word Developer

There was also an interesting release in the e-Discovery space this week from review and archiving vendor RenewData with Anagram Keyword Development, which picks the best key words for enterprises to use following an e-Discovery request.

The basic premise here is that if you pick the right terms for an e-Discovery the results you get back are going to be closer to the mark than a more general search and will save time and money wasted on sifting through thousands of irrelevant documents.

Anagram, on the other hand, uses a new method for extracting, analyzing and displaying the entire vocabulary of the document collection, in a manner which makes synonym searches fast and accurate.

Of course RenewData is quick to point out that Anagram's capabilities are not limited to e-Discovery and can be used by any enterprise that regularly has to carry out intensive searches for content management, scientific research and regulatory compliance. Check it out!

kCura Adds Legal Review Workflows

Finally, if you missed it late last week legal hold specialist kCura has added another component to its already extensive review platform that will manage not just risk assessment, but also how legal workflows are implemented across the platform.

Appropriately call Method and built using advice from a number of notable law firms, it enables users to streamline workflows, which if managed effectively can substantially reduce costs associated with e-Discovery.

Method runs off kCura’s Relativity review platform and focuses on building repeatable workflows centralized within the system that can be accessed by all users across the enterprise and which, in effect, standardizes the ‘Hold’ process.