2014 CYBERTHREAT DEFENSE REPORT
|
|
|
- Arnold Arnold
- 10 years ago
- Views:
Transcription
1 2014 CYBERTHREAT DEFENSE REPORT NORTH AMERICA & EUROPE << Research Sponsors >> Platinum sponsor: Gold sponsors: Silver sponsors:
2 Table of Contents Introduction... 3 Research Highlights... 5 Section 1: Current Security Posture... 6 Adequacy of Cyberthreat Defense Investments...6 Past Frequency of Successful Cyberattacks... 8 Future Likelihood of Successful Cyberattacks...9 Security Posture by IT Domain... 9 Network Security Technology Deployment Status Endpoint and Mobile Security Deployment Status Root-Cause Analysis Capabilities Section 2: Perceptions and Concerns Types of Cyberthreats Sources of Cyberthreats Internal vs. External Cyberthreats Perceived Effectiveness of Selected Defenses Barriers to Establishing Effective Defenses Section 3: Attack Surface Reduction Frequency of Network Vulnerability Scans Purpose of Network Vulnerability Scans Host Security Misconfigurations Accounting for Transient Devices Section 4: Future Plans IT Security Budget Change The BYOD Invasion Endpoint Protection Plans Top Selection Criteria Form Factor Preferences The Road Ahead Appendix 1: Survey Demographics Appendix 2: Research Methodology Appendix 3: About CyberEdge Group
3 Introduction Survey Demographics 763 qualified IT security decision makers and practitioners All from organizations with more than 500 employees Representing 11 countries in North America and Europe Representing 19 industries In war, knowing your enemy is imperative to establishing an effective defensive strategy. The same holds true for effective IT security, and several excellent industry reports help inform IT security professionals on this front. The annual Data Breach Investigations Report from Verizon, for example, sheds considerable light on the evolving nature of cyberthreats, the actors behind them, and the techniques being used to perpetrate successful attacks. The Cyberthreat Defense Report informs the IT security community in another, complementary way. Based on a rigorous survey of IT security decision makers and practitioners across North America and Europe, the Cyberthreat Defense Report examines the current and planned deployment of technological countermeasures against the backdrop of numerous perceptions, such as: The adequacy of existing cybersecurity investments, overall and within specific domains of IT The likelihood of being compromised by a successful cyberattack within the next 12 months The types of cyberthreats and cyberthreat sources that pose the greatest risk to a given organization The effectiveness of both traditional and nextgeneration/ advanced technologies for thwarting cyberthreats The organizational factors that represent the most significant barriers to establishing effective cyberthreat defenses The most valuable solution capabilities and packaging options By revealing these details we hope to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities, and most importantly current defensive postures stack up against those of other IT security professionals and organizations. Applied in a constructive manner, the data, analyses, and findings covered herein can be used by diligent IT security teams to gain insights into many practical questions, such as: Where do we have gaps in our cyberthreat defenses relative to other organizations? Have we fallen behind in our defensive strategy to the point where our organization is now the low- 3
4 hanging fruit (i.e., likely to be targeted more often due to its relative defensive weaknesses)? Are we on track with both our approach and progress in continuing to address traditional areas of concern such as strengthening endpoint security and reducing our attack surface as well as tackling newer ones, such as providing security for mobility and defending against advanced persistent threats (APTs)? How are other IT security practitioners thinking differently about cyberthreats and their defenses, and should we adjust our perspective and plans to account for these differences? A second objective is to provide developers of IT security technologies and products with some of the answers they need to better align their solutions with the concerns and requirements of their potential customers. The net result should be better market traction and success for solution providers that are paying attention, and better cyberthreat protection technologies for all of the intrepid defenders out there. cy ber threat /ˈsībərˌTHret/ noun 1. the possibility of a malicious attempt to damage or disrupt a computer network or system (source: Oxford Dictionaries) 2. any type of malicious activity or actor that leverages computers and networks to adversely impact other computers and networks, to include everything from well-known forms of malware (e.g., viruses, worms, and Trojans) to malicious insiders and targeted attacks (source: CyberEdge Group) 4
5 Research Highlights Current Security Posture One in four security professionals doubts whether their organization has invested adequately in cyberthreat defenses. Over 60% of respondents were affected by a successful cyberattack in 2013, but less than 40% expect to fall victim again in Mobile devices (smartphones and tablets) are perceived as IT security s weakest link, followed by laptops and social media applications. Next-generation firewalls (NGFWs) are most frequently cited for acquisition in 2014, followed by Network Behavioral Analysis (NBA) and Big Data Security Analytics. 77% intend to use network access control (NAC) as part of their mobile security strategy. One in four organizations lacks the tools necessary to properly investigate the root cause and material impact of network security breaches. Perceptions and Concerns Malware and phishing give IT security professionals the most headaches. Security professionals are more concerned about malicious insiders than cybercriminals. NAC and NGFW solutions are perceived as most effective at mitigating cyberthreats. Low security awareness among employees is the greatest inhibitor to adequately defending against cyberthreats. Attack Surface Reduction Less than half of organizations conduct full-network active vulnerability scans more than once per quarter. Nearly one-third of organizations are leveraging vulnerability intelligence as context for intelligent threat response. NAC is most commonly used to identify vulnerabilities and security misconfigurations on endpoint devices in between full-network vulnerability scans. Future Plans 89% of IT security budgets are rising or holding steady. Implementation of bring-your-own-device (BYOD) policies will more than double within the next two years from 31% in 2014 to 77% in % are looking to replace or augment their current endpoint protection software. Third-party validation is least important when evaluating new cyberthreat defenses. Only 7% of IT security professionals prefer a software-as-a-service (SaaS) delivery model for their cyberthreat defenses. 5
6 Section 1: Current Security Posture The foundation of countermeasures an organization currently has in place and the perception of how well that foundation is working will influence major decisions about cyberthreat defenses, such as: Whether, to what extent, and with what degree of urgency changes are needed, and The most likely candidates to enable those changes (i.e., the specific types of countermeasures that should be added to supplement existing defenses). Accordingly, our journey into the depths of cyberthreat defenses begins with an assessment of the perceived effectiveness of organizations investments and strategies relative to the prevailing threat landscape. Insight is also provided on the high-level definition of these strategies based on the technological countermeasures that comprise them. Cut to the Chase 25% of survey participants doubt whether their organization has invested adequately in cyberthreat defenses Europeans (82%) are somewhat more confident than North Americans (71%) in their cyberthreat defense investments Adequacy of Cyberthreat Defense Investments When asked how they perceive the adequacy of their employer s investment in cyberthreat defenses, fully one-quarter of respondents expressed doubts, with more than half of this group taking a more definitively negative view (see Figure 1). This leaves approximately 75% at the opposite end of the spectrum, with a breakdown of 30% strongly agreeing and another 44% somewhat agreeing with their employer s level of investment. We view this as an extremely encouraging result, particularly given the longstanding impression that IT security professionals are generally frustrated when it comes to obtaining sufficient funding and implementing the solutions they believe are necessary to defend their computing environments. Interestingly, the data also revealed that European respondents are somewhat more confident than their North American peers in the level of investment in cyberthreat defenses made by their employers. Overall, 82% of the European survey population indicated they agreed (somewhat or strongly) with the adequacy of investments made. This compares to 71% for North American respondents. 6
7 This greater degree of confi dence expressed by European respondents is at least partially explained and validated, respectively, by: A subsequent fi nding that fewer European organizations (57%) than North American organizations (64%) were subject to a successful cyberattack over the previous 12 months. A subsequent fi nding of a similar gap in relative confi dence when participants were asked whether they thought their organization had the necessary tools to investigate and determine the root cause and material impact of successful attacks. In that case, 82% of European respondents indicated they had confi dence in their organization s capabilities (and corresponding investments), compared to 70% of North American participants. Figure 1: Perceived adequacy of cybersecurity investments 7
8 Cut to the Chase 84% of represented organizations experienced five or fewer successful cyberattacks in the preceding 12 months 38% claim they had not experienced a single successful attack in that same period 7% claim they ve been successfully breached 10 or more times Past Frequency of Successful Cyberattacks For the most part, the relative confi dence of respondents in their organization s level of investments in cyberthreat defenses is upheld by this next set of fi ndings. In particular, over 80% of respondents indicated that their organization s computing environment was compromised fi ve or fewer times in the past year with nearly half of these claiming there were NO successful attacks over this period (see Figure 2). Less encouraging, 7% of respondents indicated their organization was subject to 10 or more successful attacks over the past year. Not surprisingly, this fi nding is generally consistent with the data from the previous question, where a total of 15% of respondents either somewhat or strongly disagreed with the level of security investments made by their organization. The only signifi cant difference from a regional perspective is that while 43% of European organizations claimed they did not experience a successful cyberattack over the past year, the same was true for only 36% of North American organizations. Figure 2: Frequency of successful attacks in the past 12 months 8
9 Future Likelihood of Successful Cyberattacks When asked about the likelihood their organization s network would be compromised in the coming year, respondents were surprisingly optimistic. Despite more than 60% indicating they thought their organization s computing environment had been compromised within the past year (see Figure 2), only 39% considered it somewhat likely or very likely that it would happen again over the next 12 months (see Figure 3). Whether this optimism stems from changes and investments made as a result of past compromises or just represents wishful thinking is unclear. No statistically signifi cant differences were observed by region (i.e., North America vs. Europe). Figure 3: Likelihood of being successfully attacked in the next 12 months Security Posture by IT Domain Data on the perceived ability to defend against cyberthreats in different IT domains (see Figure 4) provides additional granularity to the earlier question regarding adequacy of an organization s investments in cyberthreat defenses. Somewhat surprising are the fi ndings pertaining to virtualized server infrastructure 9
10 and public cloud services. In particular, our respondents expressed the same high degree of confi dence in their defenses for virtual servers as in their physical servers and network perimeters. Client devices of all types but especially mobile devices present the greatest security challenge to organizations. One plausible explanation for this seemingly misplaced confi dence could be this: although enterprise experience with server virtualization lags that which it has in other areas, and although the security solutions for virtualized infrastructure are somewhat immature on the whole, neither have we seen a signifi cant number of threats/attacks against virtualization software layers or the cloud-specifi c aspects of public cloud services (as opposed to those aspects they share with traditional datacenter delivery models). Other notable fi ndings include that: Establishing adequate protection for/from social media applications such as Facebook and Twitter remains a relative weak spot in organizations defenses, and Client devices of all types but especially mobile devices present the greatest security challenge to organizations. Not surprisingly, the data shows organizations are better able to secure resources over which IT inherently has greater control (e.g., servers) than those it does not (e.g., mobile devices). Figure 4: Perceived security posture by IT domain 10
11 Network Security Technology Deployment Status Participants were requested to designate a deployment status currently in use, planned for acquisition within 12 months, or no plans for a specified list of network security technologies. (Endpoint and mobile security technologies are addressed in the next section.) Table 1 below provides a visual and numerical representation of the responses. Percentages in green correspond to higher frequency of adoption and/or acquisition plans. Percentages in red correspond to lower adoption and/or acquisition plans. Table 1: Network security technologies in use and planned for acquisition 11
12 It seems clear that many organizations are planning to beef up their capabilities for monitoring and analyzing network traffic for the presence of cyberthreats. Notable fi ndings include: IDS/IPS, secure gateways, and stateful inspection fi rewalls are the most frequently deployed defenses. NAC technology also enjoys fairly widespread adoption (likely as result of enterprise mobility initiatives). User activity monitoring, privileged user management, and identity and access management all received in use scores of greater than 60% -- indicating that considerable attention is being paid to better understanding and controlling the activities of authorized users. NGFWs were earmarked as the top network security investment over the coming year. With network behavior analysis (NBA), big data security analytics, security information and event management (SIEM), and full-packet capture analysis also near the top of the leader board for the coming year, it seems clear that many organizations are planning to beef up their capabilities for monitoring and analyzing network traffi c for the presence of cyberthreats. Endpoint and Mobile Security Deployment Status The same approach was used to gain insight into deployment status and acquisition plans for both endpoint and mobile security technologies. Let s begin with the former (see Table 2). Table 2: Endpoint security technologies in use and planned for acquisition 12
13 There s still considerable room for improvement both in developing new endpoint security technologies and better utilizing the ones organizations already have. Overall, it appears that most organizations are defending their endpoints by combining multiple technologies to establish an effective solution. One noteworthy item, however, is that 14% of these combinations appear to lack any sort of traditional, signature-based anti-malware component. It is unclear whether this speaks to the steadily improving effectiveness of signature-less technologies or some other factor. We re also compelled to point out that despite fairly high deployment rates for the technologies listed here, endpoints are still cited as the weakest link in most organizations defense chain (see Security Posture by IT Domain). This suggests there s still considerable room for improvement both in developing new endpoint security technologies and better utilizing the ones organizations already have. Shifting to the mobile security landscape, here, too, it seems that multiple technologies are being used to get the job done (see Table 3). Table 3: Mobile security technologies in use and planned for acquisition 13
14 It s clear that VPN and NAC technologies are the dominant choices for helping to secure remote/ mobile devices and their users. It may also be the case that different combinations of technologies are being employed to meet the unique requirements of varying use cases and constituents. For example, an IT security team might deploy virtual private network (VPN), NAC, and virtual desktop infrastructure (VDI) for its general user population, but then deploy VPN, NAC, mobile device management (MDM), and containerization solutions for its mobile executives. Regardless, it s clear that VPN and NAC technologies are the dominant choices for helping to secure remote/ mobile devices and their users. MDM and MAM (mobile application management) solutions are also continuing to receive considerable attention, as they rank slightly ahead of all other mobile security solutions in terms of expressed acquisition plans reported by respondents for the coming year. Root-Cause Analysis Capabilities Participants were asked to indicate whether their organizations have the necessary tools to investigate and determine the root cause and material impact of security breaches (see Figure 5). Figure 5: Adequacy of root-cause analysis capabilities 14
15 Approximately one in four respondents were unconvinced that they have the necessary tools at their disposal to adequately investigate security breaches. Although nearly three-quarters expressed a measure of confidence in this regard, approximately one in four respondents were unconvinced that they have the necessary tools at their disposal to adequately investigate security breaches. We also observe that European respondents are incrementally more confident in their organizations rootcause analysis capabilities: while 82% of the Europeans indicated they somewhat or strongly agreed that their organizations have sufficient capabilities in this area, only 70% of their North American counterparts responded in a like manner. 15
16 Section 2: Perceptions and Concerns Cut to the Chase Malware and phishing / spear phishing are of the most concern to respondents APTs and DoS/DDoS attacks are of the least concern The exploration of cyberthreat defenses now shifts from establishing baseline security postures to determining the types and sources of cyberthreats that concern today s organizations the most. Like the perceived weaknesses that have already been identifi ed, these concerns serve as an important indicator of where and how it best makes sense for organizations to improve their cyberthreat defenses going forward. This section of the report also investigates the perceived effectiveness of various countermeasures, along with factors that most often inhibit today s organizations from establishing adequate cyberthreat defenses. Types of Cyberthreats Malware and phishing/spear phishing are the classes of cyberthreats that concern survey respondents the most (see Figure 6). Trailing by a relatively small margin are web application attacks, zero-day attacks, mobile device malware, and malicious insiders. Least concerning for this audience are advanced persistent threats (APTs) and denial (and distributed denial) of service (DoS/ DDoS) attacks, which on a weighted average basis fell below the midpoint on our 5-point scale. Figure 6: Relative concern by class/type of cyberthreat 16
17 However, this high-level summary only tells part of the story. Examining the raw data more closely yields a few additional observations: Malware and phishing/ spear phishing are the classes of cyberthreats that concern survey respondents the most. Survey Insight Respondents were more concerned about potential threats from malicious insiders than any single source of external threat. The class of threats most often receiving the designation extremely concerned was phishing/ spear phishing attacks (least often was DoS/DDoS attacks). Mobile device malware and DoS/DDoS attacks were tied as the threat classes most often receiving the not concerned designation (malware had the fewest instances of this designation). For each class of threats, not concerned was chosen by at least 8% of the respondents. Overall, the responses were widely distributed. For most classes of threats, extremely concerned and very concerned responses were largely offset by an equal distribution of mildly concerned and not concerned responses. This indicates that the perceived risk of different classes of threats is organization specific and, therefore, relying solely on the weighted averages is not sufficient in this case. Sources of Cyberthreats Looking next at the sources of cyberthreats, the data indicates that organizations are generally more concerned about cybercriminals as a group, as opposed to the sub-categories of state-sponsored and politically motivated hackers (see Figure 7). In addition, they are also more concerned with malicious insiders than any individual external source of cyberthreats. Once again, examining the raw data reveals a handful of additional points of interest: Approximately 10% of respondents expressed no concern at all about malicious insiders and cybercriminals Approximately 20% shared the same lack of concern for both state-sponsored and politically motivated hackers At the other end of the spectrum, just under 10% were extremely concerned about all sources of cyberthreats Comparing the results for this survey question to those for the preceding question also suggests that organizations are generally less concerned about the source of a threat than its type. 17
18 Figure 7: Relative concern by source of cyberthreat The concern for external threats outweighs that for internal threats by a ratio of approximately 2.5 to 1. Internal vs. External Cyberthreats When asked specifi cally about their relative concern regarding internal threats (from ill-intentioned employees or contractors) compared to external ones (from outside hackers), slightly more than one-quarter of the respondents indicated an equal level of concern about both sources (see Figure 8). (Note: for this survey question all types of external threat sources have been aggregated together; whereas for the previous question, they were evaluated individually.) Examining the balance of the responses, we see that the concern for external threats outweighs that for internal threats by a ratio of approximately 2.5 to 1 (52% for signifi cantly more concerned and somewhat more concerned about external threats compared to 21% for signifi cantly more concerned and somewhat more concerned about internal threats). Although this result cannot be ignored, it s important to also consider another perspective supported by the data: a full three-quarters of respondents indicated more than a little concern about internal threats. The only regional fi nding of note is that European respondents had a somewhat more balanced perspective overall, with 36% expressing equal concern about internal and external threats. This compares to 24% for North American participants. 18
19 Figure 8: Relative concern for internal vs. external cyberthreats Perceived Effectiveness of Selected Defenses Survey Insight NAC and NGFW solutions are perceived by respondents as having the greatest potential to defend today s cyberthreats. Respondents were asked to rate their perceived effectiveness of various cyberthreat defense solutions on a scale of 1 to 5, with 5 being the highest. The results, in the form of weighted averages, are depicted in Figure 9. Although rating effectiveness across different classes of solutions intended to address different problems is not exactly fair, the data still reveals two noteworthy items: On average, all of the solutions are perceived as being between somewhat effective and very effective. Indeed, the variation in ratings both from one solution to the next and from top (NAC) to bottom (MDM) is not that signifi cant. Overall, solutions that reduce an organization s attack surface either by eliminating vulnerabilities 19
20 or shielding them are generally viewed as more effective at what they do than those that work in a less black-and-white manner and require greater degrees of interpretation or analysis to operate (e.g., big data security analytics, advanced malware analysis, network behavior analysis, and full-packet capture analysis). Figure 9: Perceived effectiveness of cyberthreat defenses Barriers to Establishing Effective Defenses Establishing effective cyberthreat defenses is by no means easy to do. If it were, one would expect far fewer successful cyberattacks and far higher confi dence by IT security practitioners in the level of security investments made by their organizations. Part of the issue is undoubtedly the ever-evolving threat landscape. Hackers have a seemingly endless capacity to advance their wares not to mention that, as defenders, organizations can only guess at hackers next moves. 20
21 Turning to the survey data, low security awareness among employees tops the charts, with lack of budget close behind. But what about other factors? What are the other obstacles that IT security teams must overcome and, more importantly, which of them are most signifi cant? Turning to the survey data, low security awareness among employees tops the charts, with lack of budget close behind. Although too much data to analyze appears in third position, there really isn t a signifi cant gap between it and the next several items on the list. Not until the last entry lack of effective solutions in the market is there a discernible difference in the weighted responses. In this case, we view the results as a vote of confi dence in the security solutions available to today s IT security practitioners (at least relative to the other obstacles they face). Figure 10: Inhibitors to establishing effective cyberthreat defenses 21
22 Section 3: Attack Surface Reduction 75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching. Contrary to what the popular press and the buzz at industry tradeshows would have one believe, establishing effective cybersecurity defenses requires more than simply implementing the latest and greatest technologies designed to detect the latest generations of elusive cyberthreats. Indeed, a more practical strategy is to first reduce one s attack surface, and then use a collection of complementary detection-oriented countermeasures to mitigate the residual risk. Not only is such an approach intuitively appealing, it s also supported by the fact that the majority of cyberattacks still focus on exploiting known vulnerabilities. According to a report 1 published by the Center for Strategic & International Studies, 75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching. The options for organizations to reduce their attack surface area are numerous and include tactics such as: reducing the number of open ports and services on Internet-facing systems; using next-generation firewalls to granularly control network and application access; eliminating all unnecessary protocols and services running on endpoints, servers, and other internal systems; and, leveraging identity and access management solutions to implement a least-privileges policy. This section of the report focuses on another set of options: namely the tools and practices today s organizations are using to manage software vulnerabilities and host security misconfigurations. Frequency of Network Vulnerability Scans Respondents were asked how frequently their organization conducts full-network, active vulnerability scans (as opposed to scanning individual devices or enclaves, or using passive vulnerability scanning technologies that, by design, are always-on). The results are somewhat mixed (see Figure 11). 1. Raising the Bar for Cybersecurity, James A. Lewis, Center for Strategic & International Studies, February
23 Figure 11: Frequency of full-network active vulnerability scans Cut to the Chase 52% of responding organizations conduct fullnetwork vulnerability scans quarterly or annually 25% of responding organizations scan daily or weekly On one hand, we consider it a positive sign that slightly more than one-quarter of organizations are conducting full network scans weekly or daily. This represents a signifi cant commitment to cybersecurity and likely indicates greater understanding of the tremendous value of continuous monitoring. On the other hand, it is rather discouraging that approximately one in two organizations only scan their networks quarterly or annually. This fi nding is not particularly surprising, however, as these rates represent the minimum requirement for compliance with prevailing regulations and standards (e.g., the Payment Card Industry Data Security Standard, or PCI-DSS). No statistically signifi cant differences were observed by geographic region. 23
24 Purpose of Network Vulnerability Scans Not surprisingly, most organizations use the results of their network vulnerability scans in multiple ways. Purposes range from prioritizing patch management efforts (62% of respondents) and gaining deeper insight into their network s attack surface (62%), to generating regulatory compliance reports (49%). A relatively modest percentage (29%) also use scan information as contextual data to increase the fi delity and meaningfulness of output from cybersecurity management systems such as their SIEM solutions. Figure 12: How organizations use vulnerability scan data Host Security Misconfigurations Host security misconfi gurations deviations of security settings for servers, client devices, and their software from a desired state are another class of vulnerability that requires the attention of today s IT security teams. At a minimum, these departures from normal leave the door open for cyberthreats to access affected systems, gain a foothold, and then spread to other parts of the computing environment. They might also indicate risky activities being undertaken by ill-intentioned or misguided employees or, worse yet, the presence of malware that has already compromised the affected 24
25 system and instigated subtle confi guration changes to better facilitate propagation and data exfi ltration. Survey Insight NAC is our respondents preferred solution for identifying host security misconfigurations in endpoint devices. Survey participants were thus asked to indicate which technologies and approaches their organization regularly uses to identify host security misconfi gurations (see Figure 13). The most popular response (53%) was NAC which accounts for both standalone, full-featured NAC, as well as NAC-lite offerings, where a subset of associated capabilities is embedded in another security or infrastructure device. Also well represented were dedicated security confi guration management (SCM) tools (45%), followed closely by vulnerability assessment / management solutions (42%) which often include the ability to scan target systems for considerably more than just the presence of known software vulnerabilities. Demonstrating there s still considerable room for improvement in this area, nearly one-third of respondents indicated their organization relies solely on manual processes to detect host security misconfi gurations, while another 10% appear to be doing absolutely nothing. Figure 13: How organizations detect host security misconfi gurations 25
26 Accounting for Transient Devices So what about transient devices such as laptops, smartphones, and tablets? How are IT security teams handling vulnerability and security confi guration management for devices that don t permanently reside on the corporate network and might not be connected to it when regularly scheduled scans are conducted? Figure 14: Detecting vulnerabilities and misconfi gurations for transient devices More than one in five organizations continue to roll the dice by doing nothing to assess the state of their transient devices between regularly scheduled active scans. Once again, NAC (51%) and SCM tools (35%) emerged as the top solutions (see Figure 14). These were trailed only marginally by passive vulnerability scanning (32%) which works by detecting systems as soon as they connect to a network and analyzing associated communications traffi c to extract vulnerability information and traditional, active vulnerability scanners triggered by a third-party system (34%), such as a passive vulnerability scanner, SIEM, or NAC solution. Despite the availability of effective solutions such as these, however, it appears that more than one in fi ve organizations (24% North America, 18% Europe) continue to roll the dice by doing nothing to assess the state of their transient devices between regularly scheduled active scans. 26
27 Section 4: Future Plans Our data shows 2014 IT security budgets are in excellent shape. As we well know, organizations can ill afford to stand still when it comes to maintaining effective cyberthreat defenses. IT security teams must keep pace with the changes around them by making changes of their own. Some of their intentions in this regard were already revealed in an earlier section of the report, where we covered the network security, endpoint, and mobile security technologies planned for acquisition in This section further explores their future plans, along with some of the key factors driving their decisionmaking processes. IT Security Budget Change Likely the single biggest factor contributing to an IT security team s ability to affect change is their budget. Thankfully, our data shows 2014 IT security budgets are in excellent shape, with nearly 90% of organizations continuing to invest in cyberthreat defenses at least at the same level they did in 2013 (see Figure 15). Figur e 15: IT security budget changes for
28 The BYOD Invasion Survey Insight BYOD has arrived! Within two years, more than three quarters of responding organizations will have BYOD policies in place. From a cybersecurity perspective, user mobility and the proliferation of mobile device options is the Web 2.0 of this decade. To be clear, we re not suggesting that all of the security challenges of social media, social networking, and the advanced web technologies operating behind the scenes have been resolved; rather that mobile users and their devices are now the biggest security pain point for most of today s organizations. A signifi cant portion of this pain stems from the consumerization of IT and it s incorporation in the mobile world in the form of business-driven support for BYOD policies. With BYOD, IT security teams are forced to contend not only with an increasingly diverse population of devices all with different native security capabilities and widely varying support from third-party security software but also with the fact that control over these devices must be shared with their owners. So when do organizations expect to have to deal with the challenges of this brave new BYOD world? For nearly one-third of our survey population, that day has already come (see Figure 16). Another 46% will follow within the next two years. Figure 16: Timeframe for implementing BYOD policy 28
29 Digging deeper into the data, we also observe a somewhat less-aggressive adoption of BYOD among European survey participants: only 21% have already implemented a BYOD policy (compared to 35% for North America), while one-third (34%) indicate that they have no plans to do so at any time (compared to 19% for North America). More than half signaled they would be evaluating new solutions for endpoint anti-malware protection, either to augment or replace existing countermeasures. Endpoint Protection Plans It s not only mobile devices that are problematic for IT security teams, but other types of endpoints (desktops and laptops), too. Part of the issue is, and always will be, the potential for ill-advised user actions such as opening suspicious attachments, using USB memory sticks from untrusted sources, and, of course, visiting questionable websites. Compounding matters, however, is the steadily eroding effectiveness of signature-based AV engines in the face of advanced malware featuring polymorphism and an ever-growing array of evasion techniques. Given this situation, we asked participants about their organization s intent to evaluate new anti-malware solutions for endpoints. The results reinforce our earlier fi ndings that endpoints remain a problem area for most organizations (see Figure 17). More than half (56%) signaled they would be evaluating new solutions for endpoint anti-malware protection, either to augment (34%) or replace (22%) their existing countermeasures. Figure 17: Plans for replacing or augmenting endpoint protection software 29
30 Top Selection Criteria Survey Insight When evaluating cyberthreat defense solutions, performance and security are slightly more important than detection accuracy to our respondents. Which criteria most strongly infl uence an IT security team s selection of a new technology to fi ll a gap in its cyberthreat defenses? Conventional wisdom suggests that security effectiveness how well a solution performs its main function (e.g., detecting known/ unknown cyberthreats, detecting vulnerabilities, or blocking unauthorized transmissions) should always lead the way. Our data shows otherwise; or, at least, that security effectiveness represented by detection accuracy and frequency of threat intelligence updates is not alone at the top of the list. In fact, performance and scalability are rated slightly more important than security effectiveness by our survey population (see Figure 18). This is not terribly surprising, however, as having one of these capabilities security or performance/scalability without the other is often pointless, especially for most enterprise-grade implementation scenarios. Figure 18: Prioritized selection criteria for cyberthreat defenses 30
31 Other observations include: Survey Insight Validation by Gartner, NSS Labs, and other third-party entities is least important to our respondents when evaluating new solutions for cyberthreat defense. Although performance/scalability and security effectiveness came out on top, the differences between these and the next handful of criteria on the list are not all that substantial. Price, ease of use, technical support, and interoperability with other solutions matter, too, and security solution providers that neglect any of these elements risk poor performance in the marketplace. Despite efforts at infrastructure and solution provider consolidation in other areas of IT, the relatively low score for availability of solution from a current vendor suggests this is a less important objective within IT security. Although external validation for example, from Gartner or NSS Labs may be useful for establishing a short list of candidate solutions, IT security buyers give it considerably less consideration relative to other criteria. Form Factor Preferences We asked our survey participants whether they had a preference for how cyberthreat defenses are packaged. The results are depicted in Figure 19. Figure 19: Preferred form factors for cyberthreat defenses 31
32 Cut to the Chase When given the choice, 56% of respondents prefer virtual appliances or software to install on customer-provided hardware Only 16% prefer purposebuilt rackmount appliances Only 7% prefer SaaS-based solutions hosted in the vendor s cloud Respondents signaled that the age of the virtual appliance is upon us with 37% favoring that option. In comparison, purpose-built hardware appliances (16%) once the form factor of choice, especially for network security technologies trailed even the software-only option (19%). In addition, only 7% indicated a preference for a SaaS approach, where the security offering is hosted in the solution provider s cloud. However, care must be taken in interpreting these findings. What IT security teams generally prefer doesn t necessarily reflect what they will ultimately purchase or even, what s available in the market, for that matter. For example, consider cyberthreat defenses that process a lot of encrypted traffic, are otherwise compute intensive, and/or that operate in-line in high-throughput environments where the amount of introduced latency is an absolutely critical consideration. In such cases, there really is no practical alternative to a purpose-built hardware appliance, typically featuring specialized chip sets, custom silicon, and processing capacity unavailable to any general-purpose server hardware. 32
33 The Road Ahead Although today s organizations seem relatively comfortable with many aspects of their cyberthreat defenses, it s also clear there s still work to be done. IT security teams may be relatively satisfied with the level of investment their organizations have made in cyberthreat defenses (74%), and optimistic (perhaps overly so given last year s rates for successful cyberattacks) that the networks they are defending will not be breached over the coming year (62%). They may also be confident about the protection of IT infrastructure domains within their control (e.g., datacenter servers and the network perimeter), and their ability to get to the root cause of any significant incidents (74%). And to be clear, this confidence is a good thing; without it, the war against cyberthreats is lost. However, as the data from the 2014 Cyberthreat Defense Report survey indicates, there is still plenty of room for improvement. For example: More than a quarter of our survey respondents paint a bleaker picture, one that suggests their organizations have yet to establish a reasonably effective foundation for cyberthreat defense. For them, the road ahead will be arduous, as they must first play catch up before gaining the opportunity to play keep up. Conventional endpoint devices (desktops and laptops) continue to be a weak point in most organizations defenses. Mobile devices (smartphones and tablets) are even more problematic, not only due to their greater portability, but also because of the compounding complexities introduced by inevitable BYOD initiatives (at 31% of organizations now, and at 77% within two years). Reining in social media/networking applications (e.g., to avoid leakage of sensitive data through these channels) remains, at best, a work-in-progress. Investment levels and acquisition plans are still fairly low for many of the next-generation monitoring, analysis, and threat intelligence tools most likely to be effective against advanced malware and targeted attacks (e.g., advanced malware analysis and sandboxing, big data security analytics, and network behavior analysis). Many organizations efforts at reducing their attack surface are still deficient, which is surprising given the high impact such efforts are likely to yield. Increased frequency of scanning for vulnerabilities and host security misconfigurations and making more thorough use of the resulting data would certainly be beneficial in many cases. In addition, the relative security and confidence of today can be gone tomorrow. As defenders, IT security teams can only make educated guesses at what attackers will try next, and where they will try it. This also means these teams need to provide protection for practically everything in their computing environments, even as those environments are experiencing near-continuous change (in the form of new applications, systems, technologies, and delivery models). The bottom line is that maintaining effective cyberthreat defenses not only requires constant vigilance, but also an eye on the road ahead. Looking beyond the scope of the 2014 Cyberthreat Defense Report survey, here are a handful of additional items that we believe will warrant close attention from IT security teams going forward: 33
34 The cloud computing paradox. From a cybersecurity perspective it s true that many aspects of public cloud services are no different from the managed and outsourced computing services IT security teams have already dealt with for years. However, what is significantly different for both public and private varieties is the emergence of allpowerful cloud management and orchestration platforms and the extensive, open APIs they (and other systems) can leverage. The power to turn on, turn off, and otherwise reconfigure entire swaths of infrastructure has never been at once so concentrated and so diffused. Among numerous other protections, this area simply screams for least privileges access control and corresponding identity and access management/governance. Application-layer DoS attacks. The omitted D (for distributed denial-of-service, or DDoS) is not a mistake. This relatively new and rising class of threats does not depend on an insurmountable flood of network traffic to be effective. Instead, all that is required is for a single node (or handful of them) to issue just the right commands and make just the right requests of an application to kick off a disproportionate amount of back-end processing such as an exceedingly complex calculation or search operation. The net result is a hung application or saturated application infrastructure, triggered by a low volume of seemingly legitimate traffic. Put another way, the result is the need for a new class of DoS and web application protection capabilities. Closed-loop defenses. The current generation of solutions for dealing with advanced cyberthreats, including targeted attacks and rapidly morphing malware, focus primarily on detection for example, by engaging out-of-band analysis techniques. Actually preventing the corresponding threat activities from continuing is typically left as a separate exercise that requires IT security staff to update and possibly re-configure in-line defenses, such as NGFWs. This approach, however, will become untenable as the frequency of advanced cyberthreats continues to increase and a growing backlog of mitigation activities leaves the computing environment unprotected for extended periods of time. As a result, IT security teams will increasingly need to pursue closed-loop defenses, where integration between different countermeasures enables automated response to out-of-band detection events. Network virtualization. The next big thing in infrastructure virtualization, network virtualization technology is poised to revolutionize network infrastructure and delivery of network services (e.g., routing, switching, and load balancing). It also has significant implications for deployment of network-based countermeasures and how they and other security technologies will need to be designed to maintain visibility and control despite the ever-increasing portability of computing workloads and the growing irrelevance (or at least fluidity) of certain policy enforcement attributes, such as a system s IP address or actual physical location. For further insights on these and other emerging areas pertinent to IT security, be on the lookout for the next installment of the Cyberthreat Defense Report, currently scheduled for release in February
35 Appendix 1: Survey Demographics 75% of our 763 qualifi ed survey participants specifi ed United States of America or Canada as their country of residence. Although the balance of the survey population is spread across nine European countries, the majority of this group is from the United Kingdom, France, and Germany. Figure 20: Survey participation by geographic region As for the roles of our survey participants, over one-quarter hold senior positions (CIO, CISO, or IT security manager/director) within IT security. The remaining three-quarters are split almost evenly among IT security administrators/operations staff, IT security architects and auditors, and personnel identifying their position within IT security as other. Figure 21: Survey participation by IT security role 35
36 Nearly 40% of the survey respondents are from enterprises with more than 10,000 employees. The largest segment of the survey population (46%) is from organizations with between 1,000 and 10,000 employees. Only 15% of participants are from smaller organizations of between 500 and 1,000 employees. Figure 22: Survey participation by organization employee count Distribution of survey participants by vertical industry is fairly broad, with representation across 19 industry segments. The top six segments telecom/technology, education, fi nancial services, government, manufacturing and healthcare accounted for nearly 70% of all respondents. No single industry accounted for more than 16% of participants. Figure 23: Survey participation by industry 36
37 Appendix 2: Research Methodology CyberEdge Group developed a 27-question (10-15 minute) web-based survey instrument in partnership with its sponsoring vendors. The survey was promoted to information security professionals across North America and Europe in November 2013 through multiple IT security media outlets. Amazon.com gift certificate incentives were offered to the first 100 North American and the first 100 European participants to complete the survey in full. Non-qualified survey responses were deleted from non-it security professionals and from participants employed by an organization with less than 500 global employees. Most survey questions (aside from demographic questions) included a Don t know choice to minimize the potential for respondents answering questions outside of their respective domains of expertise. All qualified survey responses were inspected for potential survey cheaters, meaning those survey takers that responded to questions in a consistent pattern (e.g., all A responses, A-B-C- A-B-C responses) in an attempt to complete the survey quickly in hopes of receiving the survey incentive. Suspected cheater survey responses were deleted from the pool of responses. The sample size ( n ) for each set of survey question responses varied for multiple reasons. In all instances, Don t know responses were excluded from analysis. In some instances, survey takers completed a portion of the survey but then dropped off prior to completion. Appendix 3: About CyberEdge Group CyberEdge Group is an award-winning research, marketing, and publishing firm serving the needs of information security vendors and service providers. Our highly experienced consultants have in-depth, technical expertise with dozens of IT security technologies, including: Advanced Threat Detection Big Data Security Analytics Endpoint Security Software File Integrity Monitoring (FIM) Intrusion Prevention System (IPS) Mobile Device Management (MDM) Network Behavior Analysis (NBA) Next-Generation Firewall (NGFW) Patch Management Penetration Testing Privileged Identity Management (PIM) Secure Gateway (SEG) Secure Web Gateway (SWG) Security Configuration Management (SCM) Security Information & Event Management (SIEM) Virtualization & Cloud Security Vulnerability Management (VM) For more information on CyberEdge Group and our services, call us at , us at [email protected], or connect to our website at 37
38 Copyright 2014, CyberEdge Group, LLC. All rights reserved. The CyberEdge Group name and logo are trademarks of CyberEdge Group, LLC in the United States and other countries. All other trademarks and service marks are the property of their respective owners. 38
Managing the Ongoing Challenge of Insider Threats
CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
A Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
The Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible
White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
White. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services
MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
Leverage Micro- Segmentation To Build A Zero Trust Network
A Forrester Consulting Thought Leadership Paper Commissioned By VMware July 2015 Leverage Micro- Segmentation To Build A Zero Trust Network Table Of Contents Executive Summary... 1 Current Security Implementations
BEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
Non-Geeks Guide to. Network Threat Prevention
Non-Geeks Guide to Network Threat Prevention 1 2 Table of Contents The Evolution of Network Security Network Security: A Constantly-Evolving Threat Why are networks at more risk than ever before? Evaluating
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH
INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH INTRODUCTION: WHO S IN YOUR NETWORK? The days when cyber security could focus on protecting your organisation s perimeter
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the Effort Out of Log Management and Gain the Actionable Information You Need to Improve Your Organisation s
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
1. Thwart attacks on your network.
An IDPS can secure your enterprise, track regulatory compliance, enforce security policies and save money. 10 Reasons to Deploy an Intrusion Detection and Prevention System Intrusion Detection Systems
McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
A Modern Framework for Network Security in Government
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
