One of the big things at the RSA event in San Francisco has been the need for “visibility.” While this means a lot of different things depending on where in the security industry you sit, the consensus is that you can’t combat what you don’t know, i.e., visibility into what is out there is critical.
In keeping with the idea that finding out as much as possible about threats is a great thing, F5 Networks, a leader in the critical policy enforcement area, decided to take advantage of the packed exhibit floor and queried 150 real experts — authenticated as true experts with a few questions before they were asked for more detailed information about their views— that while admittedly anecdotal was interesting to say the least.
Four questions surrounding security trends were asked. And, as F5 noted, “The survey revealed that organizations are struggling to keep pace with the changing face of security. Virtualization, BYOD and shifts in IT infrastructures and applications along with the complexity of attack types are driving new threats. IT admits that these threats are beyond the scope of traditional safeguards. As such, IT reports that their general security readiness is subpar.”
Below are the findings reported by F5.
When asked what security trends have the greatest impact on an organization’s ability to achieve the level of security it desires, respondents answered:
Importantly, these trends are quite common with between 58 and 75 percent of all organizations seeing these trends:
Threats are moving beyond the capability of traditional spam and malware detection safeguards. Unfortunately, a sizeable percentage of respondents report that traditional security safeguards are less than adequate in protecting against these new threats:
BYOD is seen as critical in an organization’s ability to achieve the level of security it desires, yet organizations are not taking the appropriate steps to address it.
However, 35 percent of respondents say they are not prepared to provide adequate security to
In the coming days, I will have more about all of this as I wrap up my interviews with security industry movers and shakers. However, as a benchmark of where the industry stands, the trends identified confirm the fact that the job of IT of protecting enterprise data (where it is stored) and who, what, where, why, how it is accessed, and how all of this is then tracked, analyzed and use to help mitigate risk, the state of the union is well reflected here. And, what is complicating matters is that the bad guys are sophisticated and adroit, don’t sleep and the proliferation of BYOD and the cloud is only giving them more targets of opportunity. At the same time, IT feels the speed of business change is creating an environment where they have less control just when they need more.
Help is on the way on the show floor, so stay tuned.
You can also update hardware with the new operating system and even though Surface sells initially with Windows 8 it will get an update to Windows 10 …
Where does this mass hysteria over the NCAA come from? Its not just about a widespread love of basketball. Its popularity is the result of the tournam…
Reader alert! This is no pre-April Fool's Day item. In fact, the organizers of World Backup Day have been careful to schedule their event for March 31…
In the words of the late Peter Drucker, "What gets measured gets managed". This also holds true in today's cyber threat landscape.
CAD Windows apps can now be moved to the cloud thanks to Menlo Park, California-based startup Frame (formerly MainFrame2). This represents what is lik…