Click me
Transcribed

A New Era in Information Security

A NEW ERA in Information Security It hasn't gotten better... It's just getting worse. 75% believe their organizations are about the same or more vulnerable to attacks than a year ago Over half say 10% or less of their IT budget will be allocated to information security 77% 66% 40% say the sophistication of threats is increasing believe there are more ways to attack a corporate network have budget constraints holding them back Top Security Threats: Cyber-Criminals and Employees and Hackers. Oh My! Cyber-criminals 56% Authorized users or employees 49% Application vulnerabilities 40% Public interest groups or hacktivists 21% External users 19% Types Of Security Breaches Over Past Year 35% Web or software applications exploited 59% 26% Phishing Denial of service 76% 25% Theft of computers or storage devices Malware (e.g, viruses, worms, botnets) A Balancing Act IT security pros are challenged with creating a secure business that doesn't hinder operations. Biggest Information or Network Security Challenges Managing the complexity of security 38% Enforcing security policies 38% Assessing risk 33% Controlling user access to systems and data 30% Getting management buy-in or adequate funding 27% Security Practices IT Pros Find Most-Valuable Strong Passwords 2. 3 4. End-user Log analysis, security info mgmt, or vulnerability analysis and research security Virus and worm detection and analysis awareness training Multifactor authentication Big data and log analysis ranked 10th among most-valuable security product. The technology is difficult but the value is there; organizations just need the right people and processes to extract the value from log analysis and SIEM. Most-Valuable Products Security Products in Use 1 Firewalls Firewalls Endpoint protection (antivirus, anti-spyware) Email security and spam filtering 01 10 3 Endpoint protection (antivirus, anti-spyware) Data encryption Email security and spam filtering 4 VPN 01 10 VPN Data encryption Mobile Threats 52% consider the use or increased use of mobile devices a factor in their organization's increased vulnerability. 83% believe mobile devices pose a threat. MDM The Best Prevention: Mobile Device Management Software Only 45% use MDM software to set and 0 enforce a single security policy across different ttypes of devices. Security Budget Constraints? The Case For MDM The MDM purchase can be allocated from the overall IT budget as a mobile product. The software does more than protect from security threats; it helps deliver a good end-user experience and gives applications controlled access to corporate resources. The Silver Lining of Cloud When thinking about risks related to using cloud services, what are your top concerns? Just 31% of organizations perform their own risk assessments of cloud service providers. Why? Only 22% believe the inability to audit or assess outsourcing and/or cloud vendors directly contributes to increased vulnerability The Risks Of Using Cloud Services Unauthorized access to or leak of our customers' information 51% Security defects in the technology itself 18% Unauthorized access to or leak of our proprietary information Application or system performance 35% Business continuity and disaster recovery readiness of provider 3'1% To download InformationWeek's 2014 Strategic Security Survey report and get inside the minds of more than 500 security decision makers, please visit CreateYourNextCustomer.com. UBM Tech's security communities, Dark Reading and Black Hat, offer technology marketers a trusted platform to launch and sustain marketing efforts. Whether the goal is to build brand recognition, educate prospects, drive traffic to your website, or generate leads, partnering with Dark Reading and Black Hat is the best integrated approach to engaging future buyers of your technology products and services online and in person. For more information or to get started contact us at cync@ubm.com. Data: InformationWcck Strategic Sccurity Survcy, May 2014 Create Your Next Customer UBM @CYNC_marketing Tech

A New Era in Information Security

shared by CYNC_marketing on Jul 25
178 views
2 shares
0 comments
InformationWeek 2014 Strategic Security Survey Our latest report comprehensively assesses the current state of security programs, where organizations are focusing their security efforts, and how IT i...

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size