1 Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager and Kyle Prigmre, Assciate Analyst August by The Enterprise Strategy Grup, Inc. All Rights Reserved.
2 Intrductin Research Objectives Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing In rder t accurately assess rganizatins netwrk security plicies, prcesses, rganizatins, and technlgies, ESG recently surveyed 397 security prfessinals representing enterprise-class (1,000 emplyees r mre) rganizatins in Nrth America. All respndents were respnsible fr r directly invlved in the planning, implementatin, r peratins f their rganizatin s netwrk security plicies, prcesses, r technical safeguards. The survey was designed t answer questins abut: Netwrk security knwledge and pinins D IT rganizatins believe that netwrk security is getting mre difficult? If s, why? What is driving netwrk security strategy? What are the biggest netwrk security challenges fr enterprise rganizatins? The rganizatin respnsible fr netwrk security D rganizatins have the right skills and staff levels t address netwrk security? Which grup(s) are respnsible fr netwrk security tday? Are there any changes planned? Which grups are respnsible fr individual netwrk security tasks? Are there any day-t-day prblems with these grups? Netwrk security technlgies What types f security cntrls and technlgies are used tday? Hw are these changing? Hw are rganizatins adpting specific types f security technlgies such as netwrk access cntrls, next-generatin firewalls, and netwrk-based anti-malware technlgies? What are the mst cmpelling features and use cases fr these technlgies? Virtual netwrk security appliances and the use f sftware-defined netwrking (SDN) Are rganizatins using virtual security appliances? If nt, why? Are rganizatins deplying SDN? If s, what is the security grup s rle in this prcess? What are the mst cmpelling use cases fr SDN as it applies t netwrk security? Netwrk security strategies What d security prfessinals need frm netwrk security in the future? Hw are their netwrk security strategies impacting their current technlgy decisins? Survey participants represented a wide range f industries including financial services, manufacturing, business services, cmmunicatins and media, and gvernment. Fr mre details, please see the Research Methdlgy and Respndent Demgraphics sectins f this reprt by The Enterprise Strategy Grup, Inc. All Rights Reserved.
3 Research Methdlgy T gather data fr this reprt, ESG cnducted a cmprehensive nline survey f IT and infrmatin security prfessinals frm private- and public-sectr rganizatins in Nrth America (United States and Canada) between April 22, 2014 and May 5, T qualify fr this survey, respndents were required t be IT prfessinals directly invlved in the planning, implementatin, and/r peratins f their rganizatins netwrk security plicies, prcesses, r technical safeguards. All respndents were prvided an incentive t cmplete the survey in the frm f cash awards and/r cash equivalents. After filtering ut unqualified respndents, remving duplicate respnses, and screening the remaining cmpleted respnses (n a number f criteria) fr data integrity, we were left with a final ttal sample f 397 IT and infrmatin security prfessinals. Please see the Respndent Demgraphics sectin f this reprt fr mre infrmatin n these respndents. Nte: Ttals in figures and tables thrughut this reprt may nt add up t 100% due t runding.
4 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Respndent Demgraphics The data presented in this reprt is based n a survey f 397 qualified respndents. Figures 1 thrugh 4 detail the demgraphics f the respndent base, including individual respndents rles, as well as respndent rganizatins ttal number f emplyees, primary industry, and annual revenue. Respndents by Rle Respndents current rle with their rganizatin is shwn in Figure 1. Figure 1. Survey Respndents by Rle Which f the fllwing best describes yur current respnsibility within yur rganizatin? (Percent f respndents, N=397) IT staff, 11% IT management, 23% Respndents by Number f Emplyees The number f emplyees in respndents rganizatins is shwn in Figure 2. Figure 2. Survey Respndents by Number f Emplyees Senir IT management (e.g., CIO, VP f IT, Directr f IT, etc.), 65% Surce: Enterprise Strategy Grup, Hw many ttal emplyees des yur rganizatin have wrldwide? (Percent f respndents, N=397) 20,000 r mre, 25% 1,000 t 2,499, 16% 10,000 t 19,999, 12% 2,500 t 4,999, 26% 5,000 t 9,999, 21% Surce: Enterprise Strategy Grup, by The Enterprise Strategy Grup, Inc. All Rights Reserved.
5 Respndents by Industry Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Respndents were asked t identify their rganizatins primary industry. In ttal, ESG received cmpleted, qualified respndents frm individuals in 19 distinct vertical industries, plus an Other categry. Respndents were then gruped int the brader categries shwn in Figure 3. Figure 3. Survey Respndents by Industry What is yur rganizatin s primary industry? (Percent f respndents, N=397) Cmmunicatins & Media, 7% Other, 16% Financial (banking, securities, insurance), 22% Gvernment (Federal/Natinal, State/Prvince/Lcal), 7% Business Services (accunting, cnsulting, legal, etc.), 7% Retail/Whlesale, 10% Health Care, 11% Manufacturing, 21% Surce: Enterprise Strategy Grup, Respndents by Annual Revenue Respndent rganizatins annual revenue is shwn in Figure 4. Figure 4. Survey Respndents by Annual Revenue 25% What is yur rganizatin s ttal annual revenue ($US)? (Percent f respndents, N=397) 22% 20% 15% 15% 14% 14% 13% 10% 5% 3% 6% 8% 4% 0% Less than $100 millin $100 millin t $ millin $250 millin t $ millin $500 millin t $ millin $1 billin t$5 billin t $4.999 $9.999 billin billin $10 billin $20 billin t $ r mre billin Nt applicable (e.g., public sectr, nnprfit) Surce: Enterprise Strategy Grup, by The Enterprise Strategy Grup, Inc. All Rights Reserved.
6 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Cntents List f Figures... 3 List f Tables... 4 Executive Summary... 5 Reprt Cnclusins... 5 Intrductin... 8 Research Objectives... 8 Research Findings... 9 ESG s Netwrk Security Segmentatin Mdel... 9 The Netwrk Security Landscape The State f Netwrk Security Netwrk and Security Staffing Netwrk Security Technlgy Use f Netwrk Access Cntrls Next-generatin Firewalls (NGFWs) Netwrk-based Anti-Malware Security, Virtualizatin, and Sftware-defined Netwrking (SDN) Cnclusin Research Implicatins fr Infrmatin Security Vendrs Research Implicatins fr IT and Infrmatin Security Prfessinals Research Methdlgy Respndent Demgraphics Respndents by Rle Respndents by Number f Emplyees Respndents by Industry Respndents by Annual Revenue by The Enterprise Strategy Grup, Inc. All Rights Reserved.
7 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing List f Figures Figure 1. Netwrk Security Is the Mst Significant Netwrking Investment in Figure 2. ESG Netwrk Security Segmentatin Mdel Figure 3. Change in Netwrk Security Over the Last Tw Years Figure 4. Change in Netwrk Security Over the Last Tw Years, by Segmentatin Mdel Figure 5. Factrs That Have Made Netwrk Security Management and Operatins Mre Difficult Cmpared with Tw Years Ag Figure 6. Biggest Netwrk Security Challenges Figure 7. Factrs That Have the Mst Significant Impact n Shaping Organizatins Netwrk Security Strategy Figure 8. Primary Netwrk Security Strategy Objectives Figure 9. Security Organizatins Rate Their Netwrk Security Prficiency Figure 10. Hw Organizatins Manage and Operate Netwrk Security Prcesses and Technlgy Figure 11. Day-t-day Cllabratin n Netwrk Security Between IT Security and Netwrking Grups Figure 12. Divisin f Labr fr Netwrk Security Tasks Figure 13. Organizatinal Challenges Between IT Security and Netwrk Teams Specific t Netwrk Security Figure 14. Emplyment f a Netwrk Security Architect(s) Figure 15. Emplyment f a Netwrk Security Architect(s), by Segmentatin Mdel Figure 16. Organizatins Apprach t Netwrk Security Figure 17. Organizatins Apprach t Netwrk Security, by Segmentatin Mdel Figure 18. Hw Organizatins Learn Abut Netwrk Security Prduct and Technlgy Innvatin Figure 19. Organizatins Strategy fr Netwrk Security Investment Figure 20. Spending Change fr Perimeter and Internal Netwrk Security Defenses Figure 21. Technlgies and Hw They Are Used as Part f Organizatin s Netwrk Security Strategy Figure 22. Enfrcement f Netwrk Access Cntrls Figure 23. Enfrcement f Netwrk Access Cntrls, by Segmentatin Mdel Figure 24. Factrs Driving Organizatins t Use Netwrk Access Cntrls Figure 25. Netwrk Access Plicy Parameters Figure 26. Types f Netwrk Access Cntrls Enfrced/Planned t be Enfrced Figure 27. Respndents Familiarity with Next-generatin Firewalls Figure 28. Respndents Familiarity with Next-generatin Firewalls, by Segmentatin Mdel Figure 29. Deplyment f Next-generatin Firewalls Figure 30. Mst Apprpriate Use Case fr Next-generatin Firewalls Figure 31. Mst Cmpelling Features f Next-generatin Firewalls Figure 32. Mst Imprtant Requirements fr a Data Center Firewall Figure 33. Netwrk-based Anti-malware Deplyment Figure 34. Mst Cmpelling Features f Netwrk-based Anti-Malware Technlgy Figure 35. Anti-malware Technlgy and Analytics Integratin n Netwrks and Endpints Figure 36. Anti-malware Technlgy and Analytics Integratin n Netwrks and Endpints, by Segmentatin Mdel Figure 37. Use f Virtual Security Appliances Figure 38. Use f Virtual Security Appliances, by Segmentatin Mdel Figure 39. Factrs That Held Organizatins Back frm Mre Extensive Use f Virtual Security Appliances Figure 40. Respndents Familiarity with SDN Technlgies Figure 41. Respndents Familiarity with SDN Technlgies, by Segmentatin Mdel Figure 42. SDN Technlgy Usage Figure 43. SDN Technlgy Usage, by Segmentatin Mdel Figure 44. Hw Organizatins Evaluated SDN Technlgy Figure 45. Hw Netwrking and Security Teams Wuld Learn Abut SDN Figure 46. SDN Deplyment Strategy Figure 47. SDN Security Use Cases by The Enterprise Strategy Grup, Inc. All Rights Reserved.
8 Research Reprt: Netwrk Security Trends in the Era f Clud and Mbile Cmputing Figure 48. Vendr Services/Supprt Items That Wuld Be Mst Helpful in Mving Frward with a Net-new Netwrk Security Initiative Figure 49. Survey Respndents by Rle Figure 50. Survey Respndents by Number f Emplyees Figure 51. Survey Respndents by Industry Figure 52. Survey Respndents by Annual Revenue List f Tables Table 1. Primary Objectives fr Organizatins Netwrk Security Strategy, by Segmentatin Mdel Table 2. Hw Organizatins Manage and Operate Netwrk Security Prcesses and Technlgy, by Segmentatin Mdel Table 3. Primary Netwrk Security Strategy Objectives, by Segmentatin Mdel Table 4. Hw Organizatins Use Varius Technlgies as Part f Their Netwrk Security Strategy, by Segmentatin Mdel Table 5. Netwrk-based Anti-malware Deplyment, by Segmentatin Mdel Table 6. Mst Cmpelling Features f Netwrk-based Anti-Malware Technlgy, by Segmentatin Mdel All trademark names are prperty f their respective cmpanies. Infrmatin cntained in this publicatin has been btained by surces The Enterprise Strategy Grup (ESG) cnsiders t be reliable but is nt warranted by ESG. This publicatin may cntain pinins f ESG, which are subject t change frm time t time. This publicatin is cpyrighted by The Enterprise Strategy Grup, Inc. Any reprductin r redistributin f this publicatin, in whle r in part, whether in hard-cpy frmat, electrnically, r therwise t persns nt authrized t receive it, withut the express cnsent f The Enterprise Strategy Grup, Inc., is in vilatin f U.S. cpyright law and will be subject t an actin fr civil damages and, if applicable, criminal prsecutin. Shuld yu have any questins, please cntact ESG Client Relatins at by The Enterprise Strategy Grup, Inc. All Rights Reserved.
A Frrester Ttal Ecnmic Impact Study Prepared Fr KPN The Ttal Ecnmic Impact Of KPN s Managed Vide Services As Used By A Large Financial Service Organizatin Prject Directr: Sebastian Selhrst March 2012 TABLE
Twards Supprting the Adptin f Sftware Reference Architectures: An Empirically-Grunded Framewrk Silveri Martínez-Fernández Universitat Plitècnica de Catalunya Jrdi Girna, 1-3 08034, Barcelna (Spain) +34
SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 INTRODUCTION The guidance prvided herein is the third versin f the Clud Security Alliance dcument, Security Guidance fr Critical Areas
TOWARDS INTEGRATED REPORTING Cmmunicating Value in the 21st Century ABOUT THIS DISCUSSION PAPER Cntents Abut this Discussin Paper 1 Summary 2 What is Integrated Reprting? Why d We Need Integrated Reprting?
A Plan t Transfrm the Empire State s Medicaid Prgram Better Care, Better Health, Lwer Csts M U L T I - Y E A R A C T I O N P L A N TABLE OF CONTENTS Intrductin... page 3 Health System Redesign in New Yrk:
The Capacity Develpment Results Framewrk A strategic and results-riented apprach t learning fr capacity develpment The Capacity Develpment Results Framewrk A strategic and results-riented apprach t learning
CREATIVE PARTNERSHIPS Explre and Develp APPLICATION PACKAGE Deadline: Nvember 15 Creative Partnerships Explre and Develp funding assists eligible applicants t: Assess their cmmunity s cultural needs and
Develping a Cmmunicatin Plan- Aim Aim The aim f a cmmunicatin plan states the verall gal f the cmmunicatin effrt. Determining the Aim Ask yurself r yur team what the verall gal f the cmmunicatin plan is.
N Unsafe Lift Wrkbk Cver and Sectin Break image prvided curtesy f Arj Canada Inc. Table Of Cntents Purpse f this wrkbk... 2 Hw t use this wrkbk...3 SECTION ONE A Brief Review f the Literature...5 SECTION
2010 LIFE AFTER STUDY Internatinal students settlement experiences in New Zealand DOL11566 NOV 10 Authrs Angie Wilkinsn, Statistics New Zealand Paul Merwd, Department f Labur Anne-Marie Masgret, Department
Research Specificatin: Cst Benefit Analysis f the impact f referral arrangements Purpse T assess the impact f referral arrangements n the market, analyse the impact f alternative plicy ptins and set ut
www.nvell.cm/dcumentatin System Administratin ZENwrks Mbile Management 2.5.x September 2012 Legal Ntices Nvell, Inc., makes n representatins r warranties with respect t the cntents r use f this dcumentatin,
A Call fr Clarity: Open Questins n the Scpe f FDA Regulatin f mhealth A whitepaper prepared by the mhealth Regulatry Calitin December 22, 2010 Authrs Bradley Merrill Thmpsn Epstein, Becker & Green P.C.
THIS PAGE LEFT INTENTIONALLY BLANK THE DEPARTMENT OF DEFENSE CYBER STRATEGY April 2015 THIS PAGE LEFT INTENTIONALLY BLANK THIS PAGE LEFT INTENTIONALLY BLANK TABLE OF CONTENTS I. INTRODUCTION...1 II. STRATEGIC
A Beginner s Guide t Successfully Securing Grant Funding Intrductin There is a wide range f supprt mechanisms ut there in the funding wrld, including grants, lans, equity investments, award schemes and
CODE OF CONDUCT FOR INTERNET, EMAIL, DOCUMENT AND COMPUTER USE ETC Fundatin ETC Management Date 16 July 2014 Electrnic file name ETC Cde f Cnduct fr Internet, Email, Dcument and Cmputer Use Fr Apprval:
The Data Center Management Elephant By David Cle DATA CENTER SOLUTIONS Fr Mre Infrmatin: (866) 787-3271 Sales@PTSdcs.cm 2010 N Limits Sftware. All rights reserved. N part f this publicatin may be used,
Tmasz REJMAN SENIOR MANAGEMENT EXECUTIVE DEPUTY CEO/ COO ***** Senir executive experienced in setting up new initiatives with verifiable year-after-year success in exceeding EBITDA, cash and efficiency
White Paper Citrix Cnsulting Best Practices Guide fr Prvisining Services and XenApp Designing an enterprise slutin fr the fast prvisining f XenApp servers Table f cntents Best Practices Guide fr Prvisining
ACEN Accreditatin Manual A publicatin f the Accreditatin Cmmissin fr Educatin in Nursing. UPDATED: July 31, 2013 ACEN 3343 Peachtree Rad NE, Suite 850 Atlanta, Gergia 30326 Phne: 404.975.5000 Fax: 404.975.5020