WELCOME TO THE FUTURE OF CYBER SECURITY CYBER SECURITY 2017 SURVEY Check Point Software Technologies Ltd. All rights reserved 1

Similar documents
The Cloud App Visibility Blindspot

ForeScout CounterACT. Continuous Monitoring and Mitigation

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

My CEO wants an ipad now what? Mobile Security for the Enterprise

Continuous Network Monitoring

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

White. Paper. Rethinking Endpoint Security. February 2015

Five Tactics to Hybrid Cloud Success

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

FIVE PRACTICAL STEPS

The cloud - ULTIMATE GAME CHANGER ===========================================

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Cisco Security Optimization Service

KEY STEPS FOLLOWING A DATA BREACH

Cyber Security for Competitve Advantage: How SaaS Providers are Transforming their Business

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

VIGILANCE INTERCEPTION PROTECTION

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

The Attacker s Target: The Small Business

Hands on, field experiences with BYOD. BYOD Seminar

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

The Benefits of an Integrated Approach to Security in the Cloud

OVERVIEW. Enterprise Security Solutions

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

CA Enterprise Mobility Management MSO

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

BYOD & MOBILE SECURITY

Endpoint Threat Detection without the Pain

Safeguarding the cloud with IBM Dynamic Cloud Security

Detecting Cyber Attacks in a Mobile and BYOD Organization

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

VDI Security for Better Protection and Performance

Dell Mobile Clinical Computing

Readiness Assessments: Vital to Secure Mobility

Dell Desktop Virtualization Solutions DVS Enterprise

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Risk and threats everywhere, all the time

Password Management Evaluation Guide for Businesses

Driving Company Security is Challenging. Centralized Management Makes it Simple.

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

Preemptive security solutions for healthcare

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IT S TIME TO RETHINK SECURITY MANAGEMENT A Resource for the Security Professional

Guideline on Safe BYOD Management

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Maximizing Configuration Management IT Security Benefits with Puppet

Is Your Identity Management Program Protecting Your Federal Systems?

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Cloud Security Who do you trust?

Endpoint protection for physical and virtual desktops

State of Network Security 2014

Dynamic Security for the Hybrid Cloud

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Mobility, Security Concerns, and Avoidance

Building a Comprehensive Mobile Security Strategy

Teradata and Protegrity High-Value Protection for High-Value Data

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

MOBILE DEVICE MANAGEMENT PLATFORMS TO EMPOWER THE ENTERPRISE A BUSINESS CASE FOR MDM

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

MSP Relevance. MSP Relevance. the Era of Cloud Computing. the Era of Cloud Computing. Brought to You By: A Channel Company White White Paper Paper

Securing the mobile enterprise with IBM Security solutions

How To Protect A Virtual Desktop From Attack

SANS Top 20 Critical Controls for Effective Cyber Defense

Addressing BYOD Challenges with ForeScout and Motorola Solutions

The Evolution of the Enterprise And Enterprise Security

Internet threats: steps to security for your small business

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

Virtualization Essentials

Kaspersky Security for Mobile

State of Mobility Survey. France Results

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

What Do You Mean My Cloud Data Isn t Secure?

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Total Protection for Compliance: Unified IT Policy Auditing

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

Securing the Internet of Things

Enterprise Security Tactical Plan

Preparing your network for the mobile onslaught

On Premise Vs Cloud: Selection Approach & Implementation Strategies

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks

Freedom Stairway to the Cloud Offering

10 Hidden IT Risks That Might Threaten Your Law Firm

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

The Convergence of IT Operations

UC Merced CyberRisk Update

Risks and Challenges

Speed Up Incident Response with Actionable Forensic Analytics

Five keys to a more secure data environment

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Conquering PCI DSS Compliance

Cisco Advanced Malware Protection for Endpoints

Building a Business Case:

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Strategies for the. Efficient CISO. The Shift into the Cloud

Transcription:

WELCOME TO THE FUTURE OF CYBER SECURITY CYBER SECURITY 2017 SURVEY 2017 Check Point Software Technologies Ltd. All rights reserved 1

INTRODUCTION The future is no longer on a distant horizon: Mobility has overtaken the desktop as a fundamental part of how business is conducted; cloud adoption is prompting businesses to transform how they roll out applications and services with the promise of a more agile and automated IT infrastructure; IoT is connecting greater numbers of devices; and big data is gathering information on everything from telemetry readings of sensors to how many calories have been burned during an afternoon walk. The security implications among all of these elements are significant. The sophistication of modern malware combined with the fact that our networks are more interconnected than ever means we are all vulnerable. Despite all the money spent on cyber security, networks are continually breached and the severity of attacks seems to be on the rise. That begs the question: Are we taking the right actions and investing in the right places? Also, is our security strategy in alignment with rapidly changing business needs or are we leaving our networks, endpoints and data ripe for further attacks? To get a better read on how businesses today are approaching the latest trends, Check Point teamed up with Crowd Research Partners to survey 1,900 IT professionals in USbased companies with 1,000 or more employees. This report explores current cyber security trends, organizations investment priorities, and solution choices for cloud security, threat management, mobile security and more. 2017 Check Point Software Technologies Ltd. All rights reserved 2

HOW CONFIDENT ARE YOU IN YOUR ORGANIZATION S OVERALL SECURITY POSTURE? Slightly more than one-third (35%) of the respondents either feel Extremely Confident or Very Confident with their organization s security posture. More interestingly that means nearly 65% are not confident. Many organizations remain vulnerable to security breaches because they feel security is too complicated, they don t have the resources to manage security, there are too many unknowns, or they simply don t understand the ramifications of utilizing preventative security measures. Addressing your organization s security posture means investing in the right technology, processes and procedures as well as taking the right approach. Unfortunately, many organizations simply take the wrong security approach. Utilizing multiple systems with separate management controls is costly and ineffective. A better approach to help organizations propel their business forward is where you have a single consolidated system where all threats are identified and all threats are blocked, keeping attacks outside of your network. Extremely confident Very confident 7% 28% 50% Moderately confident 11% Slightly confident 3% Not at all confident 2017 Check Point Software Technologies Ltd. All rights reserved 3

Q2 WHAT CLOUD SERVICE DELIVERY MODEL(S) IS YOUR ORGANIZATION CURRENTLY USING? The need to run processes more efficiently, improve time-to-market and enhance user experience is driving more and more enterprises to embrace the cloud as part of their IT strategy. It is interesting to note that Cloud still has many different meanings; IaaS, SaaS, PaaS and so on. Equally interesting is the fact that enterprises today deploy a variety of cloud delivery models to streamline processes and increase agility. IT teams usually have good visibility into and control over their on-premise networks. But when it comes to cloud environments, it s not as easy to see and react to threats. Regardless of how your organization defines Cloud, it s important to make sure your security can adapt to your organizations cloud strategies. PaaS 49% SaaS 72% IaaS 57% CLOUD SERVICE DELIVERY MODELS 11% 6% 2% BPaaS None Not sure/other 2017 Check Point Software Technologies Ltd. All rights reserved 4

Q3 WHAT OVERALL BENEFITS HAVE YOU REALIZED FROM YOUR CLOUD DEPLOYMENT? Enterprise IT is rapidly evolving from a hardware-centric to an application-centric model. This enables greater business agility to streamline processes and realize significant CAPEX savings. However, when we look closely at the benefits cited for the cloud, these are in direct contrast with how we implement network security. The changeover to cloud computing makes this a good time to rethink the security strategy needed to protect your organization s cloud assets and services as well as what this means for your role as an IT professional. 49% FLEXIBLE SCALABILITY 41% IMPROVED AVAILABILITY AND BUSINESS CONTINUITY 37% INCREASED AGILITY CLOUD BENEFITS 37% COST REDUCTION 31% 25% 22% 21% Accelerated deployment and provisioning Accelerated time to market Moved expenses from fixed CAPEX (purchase) to variable OPEX (rental/subscription) Improved security Improved Performance 20% Reduced complexity 20% Increased geographic reach 19% Increased employee productivity 18% Improved regulatory compliance 13% None 8% 2017 Check Point Software Technologies Ltd. All rights reserved 5

Q4 PLEASE RATE YOUR LEVEL OF OVERALL SECURITY CONCERN RELATED TO ADOPTING PUBLIC CLOUD COMPUTING While process efficiencies and network agility are key cloud drivers, enterprises of all sizes continually cite cloud security as their top concern. Despite this, cloud adoption continues to rise. Assets and data in the cloud are vulnerable to the same threats targeting our on-premise networks, and thus require the same level of protections. With networks now spanning multiple providers, a comprehensive cloud security strategy must include consistent protections across all platforms with consolidated visibility and reporting to quickly respond to threats and easily comply with regulatory demands. 31% VERY CONCERNED 81% ORGANIZATIONS HAVE SECURITY CONCERNS 18% EXTREMELY CONCERNED 6% NOT AT ALL CONCERNED 13% SLIGHTLY CONCERNED 32% MODERATELY CONCERNED 2017 Check Point Software Technologies Ltd. All rights reserved 6

Q5 WHAT ARE THE BIGGEST BARRIERS HOLDING BACK CLOUD ADOPTION IN YOUR ORGANIZATION? Cloud adoption certainly provides many benefits, but enterprise security needs to adapt to this new environment. The end goal of a cloud security strategy must be to permit businesses to realize the full benefits of the cloud without letting security slow them down. Deploying an advanced threat prevention solution that seamlessly works across any cloud platform and supports native automation and orchestration capabilities will address these concerns while allowing enterprises to embrace the cloud with confidence. 32% Lack of staff resources or expertise 34% General Security Risks 29% Integration with existing IT environment 29% Data loss & leakage risks 27% 25% 19% 16% Legal & regulatory compliance Loss of control Management complexity Fear of vendor lock-in Lack of maturity of cloud service models 16% Cost / Lack of ROI 15% None 15% Lack of budget 14% Internal resistance and inertia 14% Lack of transparency and visibility 13% Lack of management buy-in 13% Performance of apps in the cloud 10% Dissatisfaction with cloud service offerings / performance / pricing 10% Lack of customizability 8% Billing & tracking issues 6% Lack of support by cloud provider 6% Availability 4% Not sure / Other 12% 2017 Check Point Software Technologies Ltd. All rights reserved 7

Q6 WHAT ARE YOUR BIGGEST CLOUD SECURITY HEADACHES? Security concerns associated with moving data beyond IT control keeps many organizations from fully embracing the cloud. Enterprises want the ability to control their own data and keep it private all while maintaining compliance with regulatory mandates. The loss of visibility and manageability across all traffic and environments means internal breaches can go undetected and move unimpeded throughout your cloud. The same security protections safeguarding on-premise networks, data and workflows must also be part of a comprehensive enterprise cloud security strategy. 43% VISIBILITY INTO INFRASTRUCTURE SECURITY 38% SETTING CONSISTENT SECURITY POLICIES 36% COMPLIANCE 34% REPORTING SECURITY THREATS 34% 30% 28% 26% Lack of integration with on-prem security technologies No automatic discovery / visibility / control to infrastructure security Can t identify misconfiguration quickly Complex cloud to cloud / cloud to on-prem security rule matching Automatically enforcing of security across multiple datacenters 26% Lack of feature parity with on-prem security solution 19% Security can t keep up with pace of changes to new / existing applications 18% Remediating threats 16% No flexibility 7% None 7% Not sure/other 18% 2017 Check Point Software Technologies Ltd. All rights reserved 8

Q7 WHAT SECURITY TECHNOLOGIES AND CONTROLS ARE MOST EFFECTIVE TO PROTECT DATA IN THE CLOUD? There are a number of technologies enterprises utilize for protecting their data in the cloud, chief among them is data encryption. However, encryption itself isn t a fail-safe solution. Organizations should employ comprehensive protections to ensure their data is safeguarded in the cloud from even the most sophisticated threats. 76% 69% DATA ENCRYPTION NETWORK ENCRYPTION 55% ACCESS CONTROL 47% 42% 41% 35% Trained cloud security professionals Intrusion detection & prevention Firewalls / NAC Patch management Data leakage prevention 34% Log management and analytics 33% Security Information and Event Management (SIEM) 33% Network monitoring 32% Endpoint security controls 30% Single sign-on/ user authentication 29% Anti-virus/ Anti-malware 27% Employee usage monitoring 25% Cyber forensics 22% Application security scanners 21% Mobile device management (MDM) 18% Database scanning and monitoring 17% Content filtering 16% Deception-based security 11% Not sure/other 12% 2017 Check Point Software Technologies Ltd. All rights reserved 9

Q8 WHAT IS YOUR BIGGEST PAIN POINT WHEN IT COMES TO MOBILE SECURITY? Keeping mobile devices safe from cyberattacks often requires a layered approach that fits into your existing security strategy and infrastructure. Doing so helps make sure you stay abreast of the threats you re facing in real-time so you are better prepared to stop attacks before they seize control of your data. 31% 24% INCREASED HELPDESK WORKLOAD ADDITIONAL IT RESOURCES NEEDED TO MANAGE MOBILE SECURITY 16% REDUCED EMPLOYEE PRODUCTIVITY 13% MALWARE INFECTIONS AND RELATED COST 12% 10% 8% 1% Data loss or leakage occurred Unauthorized access to corporate data and systems Disrupted business activities The company had to pay regulatory fines 2017 Check Point Software Technologies Ltd. All rights reserved 10

Q9 WHAT ARE YOUR MAIN SECURITY CONCERNS RELATED TO BYOD? Allowing your employees to use their own devices for work purposes introduces security risks. Mobile devices, when combined with personal applications, also present additional challenges over securing and managing these devices that is far more complex than corporate PCs and laptops. 65% DATA LEAKAGE/LOSS 59% USERS DOWNLOAD UNSAFE APPS OR CONTENT DOWNLOAD 61% LOST OR STOLEN DEVICES 56% UNAUTHORIZED ACCESS TO COMPANY DATA AND SYSTEMS 57% 50% 47% 40% Malware Vulnerability exploits Inability to control endpoint security Ensuring security software is up-to-date Device management 40% Network attacks via Wi-Fi 33% Compliance with regulations 30% None 4% Other 3% 2017 Check Point Software Technologies Ltd. All rights reserved 11

Q10 WHAT ACTUAL NEGATIVE IMPACT DID MOBILE THREATS HAVE ON YOUR COMPANY IN THE PAST 12 MONTHS? Attacking mobile devices is now the best way to penetrate an organization s network. Still, some organizations are either unaware or unconcerned that these attacks pose a real risk. With the sophistication and number of attacks on the rise, the impact to your business can be significant. 12% Data loss or leakage occurred 25% ADDITIONAL IT RESOURCES NEEDED TO MANAGE MOBILE SECURITY 12% Reduced employee productivity 23% INCREASED HELPDESK WORKLOAD 12% Malware infections and related cost Disrupted business activities 11% Unauthorized access to corporate data and systems 10% The company had to pay regulatory fines 2% Other 1% 2017 Check Point Software Technologies Ltd. All rights reserved 12

Q11 HAVE MOBILE DEVICES BEEN INVOLVED IN SECURITY BREACHES IN YOUR ORGANIZATION IN THE PAST? Whether organizations care to admit it or not, cyberattacks on mobile devices are happening right now. Some of these attacks we know about, but many we don t. Just because you think you haven t been attacked doesn t mean you haven t it just means you don t have visibility into your enterprise mobile security posture. NO 28% YES 14% 11001010110010101 010PASSWORD10 11001010110010101 11001010110010101 58% NOT SURE / CAN T DISCLOSE 2017 Check Point Software Technologies Ltd. All rights reserved 13

Q12 IN YOUR OPINION, WHAT KEY CAPABILITIES ARE REQUIRED FOR MOBILE THREAT DEFENSE SOLUTIONS? PCs and laptops are different animals than smartphones and tablets. So it s no surprise that keeping these devices safe requires a different approach than traditional network security often provides. 68% MALWARE PROTECTION LOG 64% LOGGING, MONITORING AND REPORTING 58% EASE OF DEPLOYMENT 54% NETWORK / WI-FI ATTACK DEFENSE 52% 50% 45% 45% Vulnerability exploit defense Device configuration Role-based access control Integration with other Endpoint Management System Cross-platform support 44% App Risk Detection 41% Other 4% 2017 Check Point Software Technologies Ltd. All rights reserved 14

With IoT, mobile, and cloud reliance, we gain great benefits but also are more at risk. Yet, many businesses don t understand the danger and want to simply upgrade what s already in place. The sophistication of modern malware and tactics used by hackers means we are all vulnerable. It s time to take a different view and build the security architecture of a future that is already underway. Check Point provides an architecture and solution set that addresses the full spectrum of threats from on-premises to mobile to cloud. This comprehensive approach is designed to help you secure any environment you operate in while keeping attacks outside your networks. For more information, download the Check Point 2016 Security Report CONTACT US Worldwide Headquarters 5 Ha Solelim Street, Tel Aviv 67897, Israel Tel: 972-3-753-4555 Fax: 972-3-624-1100 Email: info@checkpoint.com U.S. Headquarters 959 Skyway Road, Suite 300, San Carlos, CA 94070 Tel: 800-429-4391; 650-628-2000 Fax: 650-654-4233 checkpoint.com 2017 Check Point Software Technologies Ltd. All rights reserved 15 2016 Check Point Software Technologies Ltd. All rights reserved.