SlideShare une entreprise Scribd logo
1  sur  37
The Shifting State
of Endpoint Risk:
Key Strategies to
Implement in 2012
Today’s Agenda




             Trends in the Threat Landscape


             State of Endpoint Risk:
             Latest Survey Results


             Summary and Recommendations


             Q&A
Today’s Panelists




       Dr. Larry Ponemon    Paul Zimski
       Chairman & Founder   Vice President, Solution Marketing
       Ponemon Institute    Lumension




3
2012 Threat Trends

1. State-sponsored cyber crime will become a regular occurrence
2. Social media goes deeper – increasing threats
3. Security will finally arrive for virtualization
4. Anonymous will not go away
5. Mobile devices will come under greater attack
6. VoIP will be used as a covert channel in data breaches
7. Medicare fraud via ID theft will see explosive growth




4
State of Endpoint Risk
Latest Survey Results
Ponemon Institute                LLC




• The Institute is dedicated to advancing responsible information management
  practices that positively affect privacy and data protection in business and
  government.
• In our 10th year, the Institute conducts independent research, educates
  leaders from the private and public sectors and verifies the privacy and data
  protection practices of organizations.
• Ponemon Institute is a full member of CASRO (Council of American Survey
  Research Organizations. Dr. Ponemon serves as CASRO’s chairman of
  Government & Public Affairs Committee of the Board.
• The Institute has assembled more than 60+ leading multinational corporations
  called the RIM Council, which focuses the development and execution of
  ethical principles for the collection and use of personal data about people and
  households.




6
Project Summary

The purpose of this study is to determine
how effective organizations are in the        Survey response                Freq.    Pct%

protection of their endpoints and what
they perceive are the biggest obstacles to    Total sampling frame           18,986   100.0%

reducing risk.
                                              Total Returns                   911     4.8%
Our study involves 688 respondents
located in the United States who are
                                              Rejected surveys                80       .4%
deeply involved in their organization’s IT
function.                                     Final sample                    831     4.4%
All results were collected during August or
September 2011.                               Final sample after screening    688     3.6%




7
What organizational level best describes your current position

    Forty-seven percent of responders are managers or hold higher level positions
    within their organizations.
                         4% 1% 1%   1%

             10%
                                            22%                    Senior Executive

                                                                   Vice President

                                                                   Director

                                                                   Manager

     20%                                                           Supervisor

                                                                   Technician

                                                                   Staff

                                                                   Contractor
                                             23%                   Other


                   18%




8
Industry distribution of the 688 respondents

    The largest sectors include financial services, public sector and healthcare
    organizations.
                                                                    Financial Services
                              3% 2%1%
                         3%                                         Public Sector
                                             18%
                    3%
                                                                    Health & pharmaceuticals
               4%                                                   Services
                                                                    Technology & software
          4%
                                                                    Retailing
        4%                                                          Education & research
                                                         12%        Communications

        5%                                                          Industrial
                                                                    Hospitality
                                                                    Entertainment & media
          6%                                                        Transportation
                                                   10%              Energy
                                                                    Defense
                    8%
                                                                    Consumer products
                               8%       9%
                                                                    Agriculture




9
What is the worldwide headcount of your organization?

     The majority of the respondents are from organizations with a worldwide headcount greater
     than 5,000 people.

      35%
                                                               31%
      30%


      25%
                                               22%
                                                                               21%
      20%
                               16%
      15%


      10%

                5%                                                                             5%
       5%


       0%
            Less than 500   500 to 1,000   1,001 to 5,000 5,001 to 25,000 25,001 to 75,000   More than
               people         people           people         people           people      75,000 people




10
Attributions About Endpoint Security

     Forty-one percent of business executives support endpoint security operations. Only 35 percent of
     respondents have ample resources to minimize risk.




             Business executives are supportive of our
                                                                  18%                        23%
            organization’s endpoint security operations.




               We have ample resources to minimize IT
                                                                 15%                   20%
                                        endpoint risk.



         Laptops and other mobile data-bearing devices
             are secure and do not present a significant        11%             15%
                                          security risk.


                                                           0%         10%        20%         30%   40%   50%


                                                  Strongly agree        Agree




11
What best describes how IT operations and IT security work together?

     Only 12 percent of those surveyed indicate their IT operations and IT security work well together.


     60%


     50%                 48%

                                                          40%
     40%


     30%


     20%
                                                                                        12%
     10%


      0%
             Collaboration is adequate, but   Collaboration is poor or non-   Collaboration is excellent
                   can be improved                      existent




12
Is your IT network more secure now than it was a year ago?

The study finds that the majority of respondents believe their organizations’ endpoints are vulnerable to
attacks. Compared to last year, 66 percent of respondents say their organizations’ IT networks are not
more secure or are unsure (41 percent + 25 percent).
     45%
                                                 41%
     40%
                               36%                          36%
     35%           34%

     30%                                                                                 28%
                                                                               25%
     25%

     20%

     15%

     10%

      5%

      0%
                         Yes                           No                         Unsure

                                             FY 2011    FY 2010




13
How many malware attempts or incidents does your IT organization
deal with monthly?

      More than 75 percent of respondents experienced 26 to 50+ malware incidents per month.


     50%

     45%                                                                       43%

     40%
                                                                     35%
     35%                                                       32%
     30%                                                                              27%
     25%
                                                     21%
     20%

     15%                                      13%
                                   11%
                             9%
     10%
                   6%
     5%      3%

     0%
            Less than 5        5 to 10         11 to 25         26 to 50       More than 50

                                         FY 2011    FY 2010




14
Have your malware incidents increased over the past year?

Thirty-one percent of respondents say there has been a major increase in malware attacks and 22
percent say there has been a slight increase over the past year. Only 8 percent of respondents believe
malware attacks have decreased over the past year.
     35%
                                                                                             31%
     30%                                                                                            28%
                                                    25%    25%
     25%
                                                                         22%
                                                                                21%
     20%
                     17%

     15%      14%


     10%                               9%
                                8%

      5%

      0%
                Not sure       No, they have     No, they stayed the Yes, but only slight Yes, major increase
                                decreased               same              increase

                                               FY 2011    FY 2010




15
Where is the greatest rise of potential IT risk? (Top 5 choices)



Compared to last year, 39 percent more respondents identify mobile devices as having the greatest
potential for IT security risks.


                   Mobile devices such as smart phones
                                                                                                39%
                     (Blackberry, iPhone, IPad, Android)


           Removable media (USB sticks) and/or media
                                                                                          32%
                                        (CDs, DVDs)


            Cloud computing infrastructure and providers                            25%



            Across 3rd party applications (vulnerabilities)                 11%



     Virtual computing environments (servers, endpoints)               8%


                                                              0%   5% 10% 15% 20% 25% 30% 35% 40% 45%




16
Which one incident represents your biggest headache?

The top three incidents that present the most difficult challenges for respondents are zero day attacks (23
percent) targeted attacks (22 percent) and SQL injection (21 percent).


     40%
                                                             *FY 2010 survey did not contain this choice   35%
     35%

     30%

     25%                                                      23%           22%                     23%
                                                       21%
     20%
                      16%
     15%
              10%                  11%    11%
     10%

     5%

     0%
           Exploit of software Exploit of software    SQL injection      Targeted attacks*       Zero day attacks
           vulnerability greater vulnerability less
            than 3 months old than 3 months old

                                                  FY 2011    FY 2010




17
Which are the greatest IT security risks next year? (Top 3
concerns)
The below chart lists in descending order what respondents perceive as the five most serious security
risks their organizations will face in the near future. Respondents predict the top three IT security risks
in the next 12 months will be:

       Increased use of mobile platforms (smart
                                                                                                  36%
                                phones, iPads)


                  Insufficient budget resources                                            32%



     Use of insecure cloud computing resources                                             31%



                   Growing volume of malware                                          29%



                          Negligent insider risk                                     28%


                                                   0%   5%   10%   15%   20%   25%   30%    35%    40%




18
Use of the following technologies will increase over the next 12
months.

Respondents indicate that their use of application control whitelisting and firewall will increase
more than 50 percent.


           Application control/whitelisting (endpoint)                                               56%


       Application control firewall (gateway) (NGFW)                                                 55%

            Endpoint management and security suite
                                                                                           46%
         (integrated technologies like AV, patch, etc.)

                         Mobile device management                                         45%

           Security Event and Incident Management
                                                                                    38%
                                           (SIEM)

                      Network access control (NAC)                           30%


         Data loss/leak prevention (content filtering)                      29%


                                                          0%   10%   20%   30%     40%      50%      60%




19
What was the change in use in the following technologies?




          Application control/whitelisting (endpoint)                                    7%


           Endpoint management and security suite
                                                                                        7%
        (integrated technologies like AV, patch, etc.)

                  Device control (removable media
                                                                              5%
                               i.e., USB, CD/DVD)


                              Whole disk encryption                      4%


      Application control firewall (gateway) (NGFW)                2%


                                           Anti-virus         2%


                                                         0%   2%        4%         6%         8%




20
How has the effectiveness of the following technologies
changed?
       Anti-virus and anti-malware had the largest decline in effectiveness. Respondents indicated a
       17 percent decline in effectiveness.


                          -10%                          Application control firewall (gateway) (NGFW)


                      -11%                              Network access control (NAC)


                   -13%                                 Device control (USB, removable media)


            -15%                                        Patch & remediation management


        -15%                                            Vulnerability assessment


      -16%                                              Endpoint firewall


     -17%                                               Anti-virus & anti-malware


     -18% -16% -14% -12% -10% -8% -6% -4% -2%      0%




21
How concerned are you about Mac malware infections?

Eighty-five percent of Mac users surveyed indicate that they are increasingly or very concerned about
malware infections.
     50%

     45%                                                          44%
                                                                                       41%
     40%

     35%

     30%

     25%

     20%

     15%                                  12%
     10%

      5%            3%

      0%
                  Unsure           Not at all concerned   Increasingly concerned   Very concerned




22
Is your IT organization’s operating cost increasing?


       Forty-three percent of responders indicated their IT operating costs are increasing.

     60%


     50%                                                  48%
                                               46%
                 43%
                             41%
     40%


     30%


     20%

                                                                             11%          11%
     10%


     0%
                       Yes                           No                          Unsure

                                           FY 2011    FY 2010




23
To what extent are malware incidents to blame?

     Sixty-three percent of survey responses indicate malware as significantly or very significantly
     contributing to the increase in IT expense.

       45%
                                         41%     40%
       40%

       35%                                                             32%
       30%                                                     29%

       25%        22%
       20%

       15%                 14%                                                                 14%

       10%                                                                             8%

        5%

        0%
                 Very significant         Significant        Some significance              None

                                                FY 2011   FY 2010




24
How effective is your current anti-virus/anti-malware technology?


     Only 44 percent of responders consider their anti-virus/anti-malware technology to be somewhat or
     very effective.
     40%
                                                                 *FY 2010 survey did not contain this choice
     35%                         33%    34%
                                                   30%
     30%                                                  28%
                                                                                26%
     25%
                                                                         21%
     20%

     15%
              11%    12%
     10%
                                                                                              5%
     5%

     0%
             Very effective   Somewhat effective   Somewhat           Not effective at all Cannot determine*
                                                   ineffective

                                              FY 2011    FY 2010




25
Does the virtualization platform require your organization to deploy
additional security measures?




                         No, 45%

                                          Yes, 55%




26
Who provides these additional security measures?



         A combination of the virtualization and security
                                                                                                    34%
                                     technology vendors



                                The virtualization vendor                                     30%



     A security technology vendor (virtualization security
                                                                                             29%
                                             component)



                                                  Unsure               5%



                                   Other (please specify)         2%


                                                             0%   5%        10% 15% 20% 25% 30% 35% 40%




27
Does your organization have a cloud strategy?

       Sixty-two percent of responders do not have a cloud strategy.




                                 Unsure, 21%

                                                      Yes, 38%




                                   No, 41%




28
In regards to mobile device management, what are the three most
important to your organization’s needs?


         Provisioning and access policy
                                                                                   62%
                          management

         Virus and malware detection or
                                                                             55%
                            prevention

         Encryption and other data loss
                                                                       49%
                          technologies

                         Asset tracking                            47%


                     Anti-theft features                         42%


                Remote wipe capability                       41%


                 Other (please specify)         3%


                                           0%        20%   40%               60%         80%




29
Is your organization planning to expand its use of application
control/whitelisting technologies within the next 12 months?

Sixty-three percent of responders are planning to expand their use of application control/whitelisting
technologies.
     35%
                     32%
                                           31%
     30%

                                                                 25%
     25%


     20%


     15%
                                                                                        12%

     10%


      5%


      0%
              Yes, with certainty   Yes, likely to do so          No                   Unsure




30
Does your organization have an integrated endpoint security suite?


     Almost half (46 percent) of those surveyed plan to invest in an integrated endpoint security suite.


     50%
                                                       46%
     45%

     40%

     35%               33%

     30%

     25%
                                                                                   21%
     20%

     15%

     10%

     5%

     0%
                       Yes              No, but expects to within the next          No
                                                  12-24 months




31
How many software agents does your organization typically have
installed to perform management, security and/or other operations?

           Forty-nine percent of responders have 6 or more software agents installed.


     45%

     40%                                            39%

     35%

     30%

     25%                           23%

     20%          18%

     15%
                                                                     10%                10%
     10%

     5%

     0%
                 1 to 2           3 to 5          6 to 10        More than 10   Cannot determine




32
How many different software management consoles does your
organization use?


     35%

                                30%
     30%             29%


     25%   23%

     20%


     15%


     10%                                     9%               9%


     5%


     0%
           1 to 2    3 to 5    6 to 10   More than 10   Cannot determine




33
Summary of Findings

• Current approaches to endpoint security are ineffective and costly.

• Organizations do not feel more secure than they did last year.
     » This is mainly due to the use of ineffective technology solutions when better,
       more effective/efficient technologies exist but are not heavily implemented.


• IT operating expenses are increasing and a main driver of those costs is
  tied directly to an increase in malware incidents.
     » Most respondents consider malware a significant factor in those cost drivers.


• Malware continues to be on the rise with attack vectors focused more on
  third-party and web-based applications.




34
More Information
• Data Privacy Day 2012                          2012 State of the Endpoint Report
 » http://www.lumension.com/2012-Data-Privacy-
   Day.aspx                                      http://www.lumension.com/2012-state-of-the-
                                                 endpoint.aspx
• Quantify Your IT Risk with Free
  Scanners
 » http://www.lumension.com/special-offer/
   premium-security-tools.aspx


• Lumension® Endpoint Management
  and Security Suite
 » Demo:
   http://www.lumension.com/endpoint-
   management-security-suite/demo.aspx
 » Evaluation:
   http://www.lumension.com/endpoint-
   management-security-suite/free-trial.aspx




35
Q&A
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

Contenu connexe

Tendances

Technology-Fast-500-Winners-Brochure.PDF
Technology-Fast-500-Winners-Brochure.PDFTechnology-Fast-500-Winners-Brochure.PDF
Technology-Fast-500-Winners-Brochure.PDFJustin Campbell
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-resultsAccenture
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowLeona Markham
 
Willis - Health and productivity_survey_2011_v3
Willis - Health and productivity_survey_2011_v3Willis - Health and productivity_survey_2011_v3
Willis - Health and productivity_survey_2011_v3Annette Wright, GBA, GBDS
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019ValentinGarcia32
 
Southeast Asian Media Overview
Southeast Asian Media OverviewSoutheast Asian Media Overview
Southeast Asian Media OverviewRoss Settles
 
Southeast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowSoutheast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowShaen PD
 
Strategica india report fdi
Strategica india report fdiStrategica india report fdi
Strategica india report fdiSaurav Sanyal
 
DB분야 트렌드, 시장 상황 업데이트
DB분야 트렌드, 시장 상황 업데이트DB분야 트렌드, 시장 상황 업데이트
DB분야 트렌드, 시장 상황 업데이트mosaicnet
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Jen Landsberg
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012Edelman
 
Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12Brandon Williams
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 

Tendances (19)

Technology-Fast-500-Winners-Brochure.PDF
Technology-Fast-500-Winners-Brochure.PDFTechnology-Fast-500-Winners-Brochure.PDF
Technology-Fast-500-Winners-Brochure.PDF
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
 
Willis - Health and productivity_survey_2011_v3
Willis - Health and productivity_survey_2011_v3Willis - Health and productivity_survey_2011_v3
Willis - Health and productivity_survey_2011_v3
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
 
Southeast Asian Media Overview
Southeast Asian Media OverviewSoutheast Asian Media Overview
Southeast Asian Media Overview
 
Southeast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowSoutheast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_now
 
Strategica india report fdi
Strategica india report fdiStrategica india report fdi
Strategica india report fdi
 
DB분야 트렌드, 시장 상황 업데이트
DB분야 트렌드, 시장 상황 업데이트DB분야 트렌드, 시장 상황 업데이트
DB분야 트렌드, 시장 상황 업데이트
 
The Influential CIO
The Influential CIOThe Influential CIO
The Influential CIO
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Raddon Chart of the Day June 21, 2012
Raddon Chart of the Day June 21, 2012Raddon Chart of the Day June 21, 2012
Raddon Chart of the Day June 21, 2012
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012
 
Raddon Chart of the Day June 14, 2012
Raddon Chart of the Day June 14, 2012Raddon Chart of the Day June 14, 2012
Raddon Chart of the Day June 14, 2012
 
Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 

Similaire à The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 
Privacy & Data Breach Management
Privacy & Data Breach Management Privacy & Data Breach Management
Privacy & Data Breach Management Resilient Systems
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded dataMoxie Insight
 
11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Arbalejandre
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsCA Nimsoft
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social mediaJosh Feldberg
 
Information securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalInformation securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalDilpreeta Vasudeva
 
2013 cloud it metering survey results
2013 cloud it metering survey results 2013 cloud it metering survey results
2013 cloud it metering survey results Valencell, Inc.
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights Travis Burge
 
Csr branding survey - 2010
Csr branding survey  - 2010Csr branding survey  - 2010
Csr branding survey - 2010Rohit Singh
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer ResearchJon Gatrell
 
Highlights of 2011 SMB Social Business Study
Highlights of 2011 SMB Social Business StudyHighlights of 2011 SMB Social Business Study
Highlights of 2011 SMB Social Business Study SMB Group
 
Financial Times -2010 Fund Image Summary Of Findings
Financial Times -2010 Fund Image Summary Of FindingsFinancial Times -2010 Fund Image Summary Of Findings
Financial Times -2010 Fund Image Summary Of FindingsDaniel Rothman
 
Financial Times 2010 Fund Image summary of findings
Financial Times 2010 Fund Image summary of findingsFinancial Times 2010 Fund Image summary of findings
Financial Times 2010 Fund Image summary of findingsDaniel Rothman
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant ReportConnell & Partners
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds
 

Similaire à The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012 (20)

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
Privacy & Data Breach Management
Privacy & Data Breach Management Privacy & Data Breach Management
Privacy & Data Breach Management
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded data
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
 
11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPs
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social media
 
Information securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinalInformation securitysurveyreportnovninefinal
Information securitysurveyreportnovninefinal
 
2013 cloud it metering survey results
2013 cloud it metering survey results 2013 cloud it metering survey results
2013 cloud it metering survey results
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights
 
Corp Social Responsibility Survey
Corp Social Responsibility SurveyCorp Social Responsibility Survey
Corp Social Responsibility Survey
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
 
Csr branding survey - 2010
Csr branding survey  - 2010Csr branding survey  - 2010
Csr branding survey - 2010
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
Highlights of 2011 SMB Social Business Study
Highlights of 2011 SMB Social Business StudyHighlights of 2011 SMB Social Business Study
Highlights of 2011 SMB Social Business Study
 
Financial Times -2010 Fund Image Summary Of Findings
Financial Times -2010 Fund Image Summary Of FindingsFinancial Times -2010 Fund Image Summary Of Findings
Financial Times -2010 Fund Image Summary Of Findings
 
Financial Times 2010 Fund Image summary of findings
Financial Times 2010 Fund Image summary of findingsFinancial Times 2010 Fund Image summary of findings
Financial Times 2010 Fund Image summary of findings
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and Budget
 

Plus de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Plus de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012

  • 1. The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
  • 2. Today’s Agenda Trends in the Threat Landscape State of Endpoint Risk: Latest Survey Results Summary and Recommendations Q&A
  • 3. Today’s Panelists Dr. Larry Ponemon Paul Zimski Chairman & Founder Vice President, Solution Marketing Ponemon Institute Lumension 3
  • 4. 2012 Threat Trends 1. State-sponsored cyber crime will become a regular occurrence 2. Social media goes deeper – increasing threats 3. Security will finally arrive for virtualization 4. Anonymous will not go away 5. Mobile devices will come under greater attack 6. VoIP will be used as a covert channel in data breaches 7. Medicare fraud via ID theft will see explosive growth 4
  • 5. State of Endpoint Risk Latest Survey Results
  • 6. Ponemon Institute LLC • The Institute is dedicated to advancing responsible information management practices that positively affect privacy and data protection in business and government. • In our 10th year, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations. • Ponemon Institute is a full member of CASRO (Council of American Survey Research Organizations. Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board. • The Institute has assembled more than 60+ leading multinational corporations called the RIM Council, which focuses the development and execution of ethical principles for the collection and use of personal data about people and households. 6
  • 7. Project Summary The purpose of this study is to determine how effective organizations are in the Survey response Freq. Pct% protection of their endpoints and what they perceive are the biggest obstacles to Total sampling frame 18,986 100.0% reducing risk. Total Returns 911 4.8% Our study involves 688 respondents located in the United States who are Rejected surveys 80 .4% deeply involved in their organization’s IT function. Final sample 831 4.4% All results were collected during August or September 2011. Final sample after screening 688 3.6% 7
  • 8. What organizational level best describes your current position Forty-seven percent of responders are managers or hold higher level positions within their organizations. 4% 1% 1% 1% 10% 22% Senior Executive Vice President Director Manager 20% Supervisor Technician Staff Contractor 23% Other 18% 8
  • 9. Industry distribution of the 688 respondents The largest sectors include financial services, public sector and healthcare organizations. Financial Services 3% 2%1% 3% Public Sector 18% 3% Health & pharmaceuticals 4% Services Technology & software 4% Retailing 4% Education & research 12% Communications 5% Industrial Hospitality Entertainment & media 6% Transportation 10% Energy Defense 8% Consumer products 8% 9% Agriculture 9
  • 10. What is the worldwide headcount of your organization? The majority of the respondents are from organizations with a worldwide headcount greater than 5,000 people. 35% 31% 30% 25% 22% 21% 20% 16% 15% 10% 5% 5% 5% 0% Less than 500 500 to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 More than people people people people people 75,000 people 10
  • 11. Attributions About Endpoint Security Forty-one percent of business executives support endpoint security operations. Only 35 percent of respondents have ample resources to minimize risk. Business executives are supportive of our 18% 23% organization’s endpoint security operations. We have ample resources to minimize IT 15% 20% endpoint risk. Laptops and other mobile data-bearing devices are secure and do not present a significant 11% 15% security risk. 0% 10% 20% 30% 40% 50% Strongly agree Agree 11
  • 12. What best describes how IT operations and IT security work together? Only 12 percent of those surveyed indicate their IT operations and IT security work well together. 60% 50% 48% 40% 40% 30% 20% 12% 10% 0% Collaboration is adequate, but Collaboration is poor or non- Collaboration is excellent can be improved existent 12
  • 13. Is your IT network more secure now than it was a year ago? The study finds that the majority of respondents believe their organizations’ endpoints are vulnerable to attacks. Compared to last year, 66 percent of respondents say their organizations’ IT networks are not more secure or are unsure (41 percent + 25 percent). 45% 41% 40% 36% 36% 35% 34% 30% 28% 25% 25% 20% 15% 10% 5% 0% Yes No Unsure FY 2011 FY 2010 13
  • 14. How many malware attempts or incidents does your IT organization deal with monthly? More than 75 percent of respondents experienced 26 to 50+ malware incidents per month. 50% 45% 43% 40% 35% 35% 32% 30% 27% 25% 21% 20% 15% 13% 11% 9% 10% 6% 5% 3% 0% Less than 5 5 to 10 11 to 25 26 to 50 More than 50 FY 2011 FY 2010 14
  • 15. Have your malware incidents increased over the past year? Thirty-one percent of respondents say there has been a major increase in malware attacks and 22 percent say there has been a slight increase over the past year. Only 8 percent of respondents believe malware attacks have decreased over the past year. 35% 31% 30% 28% 25% 25% 25% 22% 21% 20% 17% 15% 14% 10% 9% 8% 5% 0% Not sure No, they have No, they stayed the Yes, but only slight Yes, major increase decreased same increase FY 2011 FY 2010 15
  • 16. Where is the greatest rise of potential IT risk? (Top 5 choices) Compared to last year, 39 percent more respondents identify mobile devices as having the greatest potential for IT security risks. Mobile devices such as smart phones 39% (Blackberry, iPhone, IPad, Android) Removable media (USB sticks) and/or media 32% (CDs, DVDs) Cloud computing infrastructure and providers 25% Across 3rd party applications (vulnerabilities) 11% Virtual computing environments (servers, endpoints) 8% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 16
  • 17. Which one incident represents your biggest headache? The top three incidents that present the most difficult challenges for respondents are zero day attacks (23 percent) targeted attacks (22 percent) and SQL injection (21 percent). 40% *FY 2010 survey did not contain this choice 35% 35% 30% 25% 23% 22% 23% 21% 20% 16% 15% 10% 11% 11% 10% 5% 0% Exploit of software Exploit of software SQL injection Targeted attacks* Zero day attacks vulnerability greater vulnerability less than 3 months old than 3 months old FY 2011 FY 2010 17
  • 18. Which are the greatest IT security risks next year? (Top 3 concerns) The below chart lists in descending order what respondents perceive as the five most serious security risks their organizations will face in the near future. Respondents predict the top three IT security risks in the next 12 months will be: Increased use of mobile platforms (smart 36% phones, iPads) Insufficient budget resources 32% Use of insecure cloud computing resources 31% Growing volume of malware 29% Negligent insider risk 28% 0% 5% 10% 15% 20% 25% 30% 35% 40% 18
  • 19. Use of the following technologies will increase over the next 12 months. Respondents indicate that their use of application control whitelisting and firewall will increase more than 50 percent. Application control/whitelisting (endpoint) 56% Application control firewall (gateway) (NGFW) 55% Endpoint management and security suite 46% (integrated technologies like AV, patch, etc.) Mobile device management 45% Security Event and Incident Management 38% (SIEM) Network access control (NAC) 30% Data loss/leak prevention (content filtering) 29% 0% 10% 20% 30% 40% 50% 60% 19
  • 20. What was the change in use in the following technologies? Application control/whitelisting (endpoint) 7% Endpoint management and security suite 7% (integrated technologies like AV, patch, etc.) Device control (removable media 5% i.e., USB, CD/DVD) Whole disk encryption 4% Application control firewall (gateway) (NGFW) 2% Anti-virus 2% 0% 2% 4% 6% 8% 20
  • 21. How has the effectiveness of the following technologies changed? Anti-virus and anti-malware had the largest decline in effectiveness. Respondents indicated a 17 percent decline in effectiveness. -10% Application control firewall (gateway) (NGFW) -11% Network access control (NAC) -13% Device control (USB, removable media) -15% Patch & remediation management -15% Vulnerability assessment -16% Endpoint firewall -17% Anti-virus & anti-malware -18% -16% -14% -12% -10% -8% -6% -4% -2% 0% 21
  • 22. How concerned are you about Mac malware infections? Eighty-five percent of Mac users surveyed indicate that they are increasingly or very concerned about malware infections. 50% 45% 44% 41% 40% 35% 30% 25% 20% 15% 12% 10% 5% 3% 0% Unsure Not at all concerned Increasingly concerned Very concerned 22
  • 23. Is your IT organization’s operating cost increasing? Forty-three percent of responders indicated their IT operating costs are increasing. 60% 50% 48% 46% 43% 41% 40% 30% 20% 11% 11% 10% 0% Yes No Unsure FY 2011 FY 2010 23
  • 24. To what extent are malware incidents to blame? Sixty-three percent of survey responses indicate malware as significantly or very significantly contributing to the increase in IT expense. 45% 41% 40% 40% 35% 32% 30% 29% 25% 22% 20% 15% 14% 14% 10% 8% 5% 0% Very significant Significant Some significance None FY 2011 FY 2010 24
  • 25. How effective is your current anti-virus/anti-malware technology? Only 44 percent of responders consider their anti-virus/anti-malware technology to be somewhat or very effective. 40% *FY 2010 survey did not contain this choice 35% 33% 34% 30% 30% 28% 26% 25% 21% 20% 15% 11% 12% 10% 5% 5% 0% Very effective Somewhat effective Somewhat Not effective at all Cannot determine* ineffective FY 2011 FY 2010 25
  • 26. Does the virtualization platform require your organization to deploy additional security measures? No, 45% Yes, 55% 26
  • 27. Who provides these additional security measures? A combination of the virtualization and security 34% technology vendors The virtualization vendor 30% A security technology vendor (virtualization security 29% component) Unsure 5% Other (please specify) 2% 0% 5% 10% 15% 20% 25% 30% 35% 40% 27
  • 28. Does your organization have a cloud strategy? Sixty-two percent of responders do not have a cloud strategy. Unsure, 21% Yes, 38% No, 41% 28
  • 29. In regards to mobile device management, what are the three most important to your organization’s needs? Provisioning and access policy 62% management Virus and malware detection or 55% prevention Encryption and other data loss 49% technologies Asset tracking 47% Anti-theft features 42% Remote wipe capability 41% Other (please specify) 3% 0% 20% 40% 60% 80% 29
  • 30. Is your organization planning to expand its use of application control/whitelisting technologies within the next 12 months? Sixty-three percent of responders are planning to expand their use of application control/whitelisting technologies. 35% 32% 31% 30% 25% 25% 20% 15% 12% 10% 5% 0% Yes, with certainty Yes, likely to do so No Unsure 30
  • 31. Does your organization have an integrated endpoint security suite? Almost half (46 percent) of those surveyed plan to invest in an integrated endpoint security suite. 50% 46% 45% 40% 35% 33% 30% 25% 21% 20% 15% 10% 5% 0% Yes No, but expects to within the next No 12-24 months 31
  • 32. How many software agents does your organization typically have installed to perform management, security and/or other operations? Forty-nine percent of responders have 6 or more software agents installed. 45% 40% 39% 35% 30% 25% 23% 20% 18% 15% 10% 10% 10% 5% 0% 1 to 2 3 to 5 6 to 10 More than 10 Cannot determine 32
  • 33. How many different software management consoles does your organization use? 35% 30% 30% 29% 25% 23% 20% 15% 10% 9% 9% 5% 0% 1 to 2 3 to 5 6 to 10 More than 10 Cannot determine 33
  • 34. Summary of Findings • Current approaches to endpoint security are ineffective and costly. • Organizations do not feel more secure than they did last year. » This is mainly due to the use of ineffective technology solutions when better, more effective/efficient technologies exist but are not heavily implemented. • IT operating expenses are increasing and a main driver of those costs is tied directly to an increase in malware incidents. » Most respondents consider malware a significant factor in those cost drivers. • Malware continues to be on the rise with attack vectors focused more on third-party and web-based applications. 34
  • 35. More Information • Data Privacy Day 2012 2012 State of the Endpoint Report » http://www.lumension.com/2012-Data-Privacy- Day.aspx http://www.lumension.com/2012-state-of-the- endpoint.aspx • Quantify Your IT Risk with Free Scanners » http://www.lumension.com/special-offer/ premium-security-tools.aspx • Lumension® Endpoint Management and Security Suite » Demo: http://www.lumension.com/endpoint- management-security-suite/demo.aspx » Evaluation: http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx 35
  • 36. Q&A
  • 37. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com

Notes de l'éditeur

  1. Larry