Why IT Channel Firms Need to Bolster Their Security Offerings

 
 
By Gina Roos  |  Posted 2015-04-09 Email
 
 
 
 
 
 
 
 
 
  • Previous
    1 - Security Headaches
    Next

    Security Headaches

    Malware and hacking are the top areas of concern for 50% and 49% of business executive and technology professional survey respondents, respectively. Other top areas of concern are privacy (45%), data loss/leakage (40%) and social engineering/phishing (38%).
  • Previous
    2 - Higher Priority
    Next

    Higher Priority

    74% of companies said security is a higher priority today than it was two years ago, and 85% said security will be an even higher priority two years from now. What's more, 29% of companies said they had a data loss incident in the past year, up from 19% in 2013.
  • Previous
    3 - Security Confidence
    Next

    Security Confidence

    Companies of all sizes have high satisfaction with their current security level: 57% of small companies, 62% of midsize companies and 57% of large companies are "completely" satisfied with current security Levels.
  • Previous
    4 - Change Drivers
    Next

    Change Drivers

    However, the biggest reasons respondents cited for changing their security approach include a change in IT operations (47%), reports of security breaches (43%), knowledge gained from training (34%), vulnerability discovered by audit (29%), and internal security breaches or incidents (29%).
  • Previous
    5 - Mobile Troubles
    Next

    Mobile Troubles

    Over the past year, businesses have seen employees lose mobile devices (32%), disable security features on mobile devices (31%) and experience mobile malware (30%).
  • Previous
    6 - Taking Action
    Next

    Taking Action

    Companies are taking action to increase mobile security by installing tracking/wiping software (45%), requiring a passcode on mobile devices (44%), establishing procedures for lost devices (41%) and requiring encryption on mobile devices (39%).
  • Previous
    7 - Biggest Threats
    Next

    Biggest Threats

    Open WiFi networks are one of the biggest threats to mobile security, according to 52% of respondents at large companies, 50% at midsize companies and 48% at small companies. Other big threats include viruses/malware, unauthorized apps, BYOD practices, USB flash drives, and theft/loss of corporate devices.
  • Previous
    8 - Shaping Strategies
    Next

    Shaping Strategies

    The biggest factors complicating security approaches include the growing organization of hackers (54%), greater technology interconnectivity (52%), sophistication of security threats (52%) and greater availability of hacking tools (48%).
  • Previous
    9 - New Approaches
    Next

    New Approaches

    Data loss prevention remains one of the most common new tools currently used by 58% of companies, followed by identity and access management (57%), and security information and event management (49%).
  • Previous
    10 - The Cloud and Security
    Next

    The Cloud and Security

    Following an initial cloud migration, many companies report a second move due to security-related reasons. Only 26% of respondents said they conducted a "hearing" review of cloud providers, 32% conducted a "moderate" review, and 17% conducted "little/none/don't know" review.
  • Previous
    11 - Policy Challenge
    Next

    Policy Challenge

    Only half the companies surveyed believe they have a comprehensive security policy, with 18% of small businesses not planning to establish a policy in the next year.
  • Previous
    12 - Reasons to Mitigate Risk
    Next

    Reasons to Mitigate Risk

    34% of businesses feel they have too much risk and must consider tighter security. Their top reasons to mitigate risk include the nature of emerging threats (56%), new business model/offering (56%), and an evaluation highlighted excessive threat (51%).
  • Previous
    13 - Channel Readiness
    Next

    Channel Readiness

    Nearly three out of four channel companies have security as part of their portfolio, with a higher rate among VARs, solution providers and managed service providers. At least one in three channel companies claims to offer security as a service or managed security services.
  • Previous
    14 - Channel Offerings
    Next

    Channel Offerings

    56% of IT channel companies said they offer security embedded in other products and services, and 17% said they offer a stand-alone product/service. The types of security products offered include network security (57%), business continuity/disaster recovery (56%), data protection (51%) and email/Web security (48%).
  • Previous
    15 - Lackluster Response
    Next

    Lackluster Response

    48% of IT channel firms said they experienced no inquiries and take no action as a result of major security breaches. However, 19% of IT channel companies expect to grow significantly, and 44% expect modest growth.
 

If channel companies want to tap growth opportunities in security services, they will need to make changes, which may include retraining staff, revamping their sales structure, becoming more proactive and becoming experts on all facets of a security technology they are addressing, according to a new study from CompTIA. Sixty-three percent of the nearly 300 U.S.-based IT channel companies surveyed expect their revenue from security services to grow over the next 12 months. However, some IT channel companies will need to up their game in security, according to the study. There is strong potential for channel companies to expand into areas such as compliance management, risk management, cloud security, identity and access management, mobile security, and security information and event management, which "could all easily become components in a new security baseline," said Seth Robinson, senior director, technology analysis, CompTIA. This is in addition to foundational security offerings such as network security, business continuity, email security and data protection, which many of them already offer. Here's why IT channel firms should re-evaluate their portfolios.

 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
























 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date