|By Business Wire||
|February 20, 2014 03:00 AM EST||
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions both accidental and malicious, introduce organizations to a multitude of new risks. According to a Dell global security survey released today, however, the majority of IT leaders around the world say they don’t view these threats as top security concerns and are not prioritizing how to find and address them across the many points of origin. In fact, when respondents were asked to look at long term priorities, only 37 percent ranked unknown threats as a top security concern in the next five years.
Epidemic threats come from all perimeters, both inside and outside of the organization, and are often hidden in poorly configured settings or permissions, and ineffective data governance, access management and usage policies. Dell’s global security survey of leading public and private sector security decision-makers gauged their awareness of, and preparedness for this new wave of threats plaguing IT security.
Some key findings include:
- 64 percent of respondents agree that organizations will need to restructure/reorganize their IT processes, and be more collaborative with other departments to stay ahead of the next security threat. Of those surveyed in the United States, 85 percent said this approach is needed, contrasting with the U.K. (43 percent) and Canada (45 percent), which were the least convinced this would be necessary
- Nearly 90 percent of respondents believe government should be involved in determining organizations’ cyber defense strategies, and 78 percent in the Unites States think the federal government plays a positive role in protecting organizations against both internal and external threats, which underscores the need for strong leadership and guidance from public sector organizations in helping secure the private sector
Unknown Threats Come From Every Perimeter, Both Inside and Outside of the Organization
The dramatic spike in social engineering, malicious and/or accidental internal attacks, as well as sophisticated, advanced persistent threats means the organization is vulnerable from all directions. All stakeholders must immediately take action to strengthen access to points inside and outside the perimeter, and help users prevent such attacks.
- 67 percent of survey respondents say they have increased funds spent on education and training of employees in the past 12 months; 50 percent believe security training for both new and current employees is a priority
- 54 percent have increased spending in monitoring services over the past year; this number rises to 72 percent in the United States
Among the IT decision-makers surveyed, BYOD, cloud and the Internet were the top areas of concern for security threats.
BYOD ─ A sizable number of respondents highlighted mobility as
the root cause of a breach, with increased mobility and user choice
flooding networks with access devices that provide many paths for
exposing data and applications to risk.
- 93 percent of organizations surveyed allow personal devices for work. 31 percent of end users access the network on personal devices (37 percent in the United States)
- 44 percent of respondents said instituting policies for BYOD security is of high importance in preventing security breaches
- 57 percent ranked increased use of mobile devices as a top security concern in the next five years (71 percent in the U.K.)
- 24 percent said misuse of mobile devices/operating system vulnerabilities is the root cause of security breaches
Cloud ─ Many organizations today use cloud computing,
potentially introducing unknown security threats that lead to targeted
attacks on organizational data and applications. Survey findings prove
these stealthy threats come with high risk.
- 73 percent of respondents report their organizations currently use cloud (90 percent in the United States)
- Nearly half (49 percent) ranked increased use of cloud as a top security concern in the next five years, suggesting unease for the future as only 22 percent said moving data to the cloud was a top security concern today
- In organizations where security is a top priority for next year, 86 percent are using cloud
- 21 percent said cloud apps or service usage are the root cause of their security breaches
Internet ─ The significance of the unknown threats that result
from heavy use of Internet communication and distributed networks is
evidenced by the 63 percent of respondents who ranked increased
reliance upon internet and browser-based applications as a top concern
in the next five years.
- More than one-fifth of respondents consider infection from untrusted remote access (public wifi) among the top three security concerns for their organization
- 47 percent identified malware, viruses and intrusions often available through web apps, OS patching issues, and other application-related vulnerabilities as the root causes of breaches
- 70 percent are currently using email security to prevent outsider attacks from accessing the network via their email channel
Combat Known and Unknown Threats
The survey revealed that 76 percent of IT leaders surveyed (93 percent in the United States) agree that to combat today’s threats, an organization must protect itself both inside and outside of its perimeters. This requires not only a comprehensive set of solutions that protects from the inside out and the outside in ─ from the endpoint, to the data center to the cloud ─ but one that also connects these capabilities to provide deeper insights and stronger predictive analytics so that strategic action can be taken quickly.
Stacy Duncan, vice president, IT, DavCo
“All threats expose an organization to significant risk, but unknown threats, particularly, are silent predators that can have profound and catastrophic implications on performance and continuity. At the same time, compliance demands are ever-growing in complexity. We took proactive steps to guard ourselves both from inside and outside of our perimeters. As a retailer, we take all possible measures to protect our customers, while ensuring PCI compliance for our stores. We have deeper insights and network visibility that all keep our data safe and help us stay compliant because Dell’s Connected Security portfolio weaves security tightly into all areas in and around our network.”
Will Markham, security practice lead, Colt Enterprise Services
“In today's increasingly complex threat landscape, one of the most common threats comes from employees who download and install unauthorized software, without understanding the potential risks associated with their actions. Unfortunately, organizations are not always able to identify new vulnerabilities quickly enough. This is compounded by the anytime, anyplace, anywhere nature of accessing business data ─ everywhere from inside the network to application layers and mobile devices. As an international IT services company, protecting our customers’ information is critical, and we are constantly working to ensure that all measures are in place to ensure their data is secure at all times.”
Mary Hobson, Director, eResearch South Australia
"Although cloud presents massive opportunities for corporate IT in terms of cost savings, security issues are rising to the forefront. Hosting software in the cloud presents security issues that have to be tackled in a thoughtful and connected way, versus in silos or traditional perimeter defenses. In protecting our cloud and making it the best possible platform for our researchers, our strategy includes a sharper focus on security threats that originate both from the application layer and from internal users who may threaten our network either intentionally or by accident. Our researchers are now able to access secure data 40 times faster because of our highly scalable, easily manageable cloud platform enabled by Dell.”
Ash Motiwala, chief technology officer, Identropy
“External hackers have been the focus of news reports recently, and the threats they pose get lots of attention. Just as lethal to a company’s data, however, are the unknown threats that can emerge from within the organization. At Identropy, we know that an identity and access management strategy that safeguards the network with strong tools for provisioning, privileged account management, and managing and governing access is the key to diminishing unknown internal threats, and our customers count on us to ensure their identity and access management initiatives are successful. As a visionary, Dell understands the security landscape, which is why Dell solutions can be counted on to protect the network from both outside and inside the perimeter.”
Matt Medeiros, vice president and general manager, Dell Security Products, Dell Software Group
“Traditional security solutions can defend against malware and known vulnerabilities, but are generally ineffective in this new era of stealthy, unknown threats from both outside and inside the organization. These threats evade detection, bypass security controls, and wreak havoc on an organization’s network, applications, and data, but despite these dangers, our study found, among those surveyed, organizations are just not prepared. There is still a disturbing lack of understanding and awareness of the type of impact and detriment caused by the unknown threats that can come from both sides of an organization’s data flow. As a result, we believe a new security approach is needed ─ one that’s embedded in the fabric of software, governing access to every application and protecting every device, both inside and outside a corporate network. Only then, with this Connected Security approach, will organizations have a chance at keeping one step ahead of these epidemic threats that can significantly damage their network.”
About the Survey
Dell Software commissioned Vanson Bourne to survey 1,440 IT decision makers in organizations with 500+ employees or end users. The survey took place from October-November 2013 across the U.S. (300), Canada (60), U.K. (200), France (200), Germany (200), Italy (60), Spain (60), India (200), Australia (60), and Beijing (100). Both the private and public sectors were interviewed with specific focuses on: retail, consumer products, manufacturing, higher education, education (excluding higher), government/public services, healthcare (private and public), financial services, and other commercial sectors.
1 2008 US Census Bureau reported 20,475 firms in US with equivalent demographics to the study (500+ employees). The study showed that 87% of surveyed US organizations have suffered a security breach in the last twelve months. Taking 87% of the US firms mentioned above (17813) and multiplying this figure by the average cost of security breaches reported by US respondents in the survey ($1.45M).
- Whitepaper: http://software.dell.com/dellglobalsecurity_whitepaper
- Infographic: http://software.dell.com/dellglobalsecurity_unknownthreats
- Twitter: http://www.twitter.com/dellsecurity
- Facebook: http://www.facebook.com/dellsecurity
- LinkedIn: http://www.linkedin.com/groups/Dell-Software-4793472
- Dell Software YouTube: www.youtube.com/user/DellSoftwareVideo
Delivering Complete and Connected Security
Dell Connected Security gives organizations the power to solve their biggest security and compliance challenges today, while helping them better prepare for tomorrow. From the device to the data center to the cloud, Dell helps mitigate risks to enable the business.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 25, 2016 03:00 AM EDT Reads: 1,396
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Sep. 25, 2016 02:45 AM EDT Reads: 846
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 25, 2016 02:45 AM EDT Reads: 1,680
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 25, 2016 02:15 AM EDT Reads: 1,202
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 25, 2016 12:45 AM EDT Reads: 1,030
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Sep. 25, 2016 12:45 AM EDT Reads: 1,927
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Sep. 25, 2016 12:30 AM EDT Reads: 1,586
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 24, 2016 09:45 PM EDT Reads: 1,604
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 24, 2016 09:00 PM EDT Reads: 1,426
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Sep. 24, 2016 08:30 PM EDT Reads: 1,443
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Sep. 24, 2016 08:00 PM EDT Reads: 1,651
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 24, 2016 07:00 PM EDT Reads: 2,792
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 24, 2016 06:45 PM EDT Reads: 1,483
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 24, 2016 04:30 PM EDT Reads: 1,512
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Sep. 24, 2016 04:30 PM EDT Reads: 1,703