Channel Could Help Spur Security Adoption in 2014

 
 
By Michael Vizard  |  Posted 2013-12-20 Email
 
 
 
 
 
 
 
 
 
  • Previous
    1 - Focus on Security Increases
    Next

    Focus on Security Increases

    The importance of security has grown considerably over the last two years. Significantly higher priority: 28%, moderately higher priority: 51%, no change: 18%, lower priority: 3%
  • Previous
    2 - Top Five Security Threats
    Next

    Top Five Security Threats

    A diverse number of types of threats need to be defended against. Malware: 91%, hacking: 86%, social engineering/phishing: 82%, data loss/leakage: 81%, security risks in emerging technologies: 81%
  • Previous
    3 - Security Defenses in Use at Large Organizations
    Next

    Security Defenses in Use at Large Organizations

    Data loss prevention (DLP) tends to be more important for larger organizations.Data loss prevention: 71%, identity and access management: 61% , formal risk assessment: 51%, security information and event management: 44%, enterprise security intelligence: 41%, external vulnerability assessments: 40%
  • Previous
    4 - Security Defenses in Use at Midsize Organizations
    Next

    Security Defenses in Use at Midsize Organizations

    Use of more complex security technologies is not that high. Data loss prevention: 54%, identity and access management: 43%, formal risk assessment: 40%, security information and event management: 37%, enterprise security intelligence: 34%, external vulnerability assessments: 25%
  • Previous
    5 - Security Defenses in Use at Small Organizations
    Next

    Security Defenses in Use at Small Organizations

    Adoption of advanced security technologies in small organizations is relatively light.Data loss prevention: 55%, identity and access management: 39%, formal risk assessment: 35%, security information and event management: 32%, enterprise security intelligence: 22%, external vulnerability assessments: 28%
  • Previous
    6 - Factors in Security Breaches
    Next

    Factors in Security Breaches

    Human error is more often the cause but not by much.Human error: 55%, technology error: 45%
  • Previous
    7 - Causes of Human Security Error
    Next

    Causes of Human Security Error

    It's hard to discern how much IT complexity contributes to human error. End-user failure to follow policies and procedures: 42%, IT staff failure to follow policies and procedures: 41%, lack of security expertise with Website/applications: 39%, lack of security expertise with IT infrastructure: 38%
  • Previous
    8 - Change in Security Posture in Last Two Years
    Next

    Change in Security Posture in Last Two Years

    When it comes, IT security change is unfortunately evolutionary at best. Moderate amount of change: 51%, no change/small amount of change: 36%, drastic amount of change: 13%
  • Previous
    9 - Formal Risk Analysis Is Lacking
    Next

    Formal Risk Analysis Is Lacking

    Risk analysis is a potential lucrative area for solution providers in the channel.Companies currently using: 41%, companies planning to use: 33%, no plans/not familiar: 25%
  • Previous
    10 - Balancing Risk vs. Security
    Next

    Balancing Risk vs. Security

    Convincing customers they don’t have enough security can be a challenge. Appropriate balance: 66%, too much risk: 18%, security too stringent: 17%
  • Previous
    11 - Security Mindset of the Workforce
    Next

    Security Mindset of the Workforce

    Over the years, security awareness has significantly improved but is still imperfect. Basic: 48%, advanced: 44%, low priority: 8%
  • Previous
    12 - Changes in IT Landscape Affecting Security
    Next

    Changes in IT Landscape Affecting Security

    A lot of security factors are outside the control of IT. Social networking: 52%, cloud computing: 51%, availability of easy-to-use hacking tools: 49%, interconnectivity of devices/systems: 48%, sophistication of security threats: 47%, growing organization of hackers: 47%
  • Previous
    13 - Mobile Security Incidents
    Next

    Mobile Security Incidents

    Mobile malware and employees disabling features are up the most year-over-year. Lost/stolen device: 39%, mobile malware: 28%, employees disabling security features: 26%, mobile phishing attack: 24%, violation of corporate data policy: 23%
 

IT security can be a tough sell when solution providers try to convince customers to buy products and services to prevent something from happening that many are not sure is actually occurring. Customers are aware that IT security is getting more complex, but unless they have been victimized in a way they can see, there is a tendency to want to limit investments in IT security technologies that don’t provide an easily identifiable ROI. A new survey of 500 U.S. IT and business executives conducted by CompTIA shows higher awareness of security issues relating to mobile and cloud computing. But in terms of acquiring security products beyond the basic anti-virus software and firewalls that every organization deploys, progress has been slow, the study finds. Data loss prevention (DLP) technologies tend to be fairly widely adopted, but just about every other IT security product category falls below the 50 percent level in terms of adoption. That lack of adoption may, however, represent an opportunity for solutions providers to push those products and services more aggressively in 2014, especially as the relative IT security maturity of the average organization continues to increase.

 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date