SHARE
Facebook X Pinterest WhatsApp

Proactive Threat Management Identified as Top Need: Report

Narus, a provider of dynamic network traffic intelligence and analytics for protecting governments, service providers and enterprises against cyber-threats and the risks of doing business in cyberspace, unveiled research from a Narus-sponsored study by the Ponemon Institute that pinpoints where cyber-warriors should concentrate their security efforts. Mobile security threats and nation-sponsored cyber-attacks ranked high among […]

Written By
thumbnail Nathan Eddy
Nathan Eddy
Apr 22, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Narus, a provider of dynamic network traffic intelligence and
analytics for protecting governments, service providers and enterprises
against cyber-threats and the risks of doing business in cyberspace,
unveiled research from a Narus-sponsored study by the Ponemon Institute
that pinpoints where cyber-warriors should concentrate their security
efforts.

Mobile security threats and nation-sponsored cyber-attacks ranked
high among major security concerns, while critical network
infrastructure organizations emerged as a top target for domestic and
foreign cyber-criminals. The study’s respondents, comprising a group of
information security experts, subsequently agreed that the most
essential security technology to thwart cyber-attacks is a system that
provides advanced warning.

While mobility poses a significant threat to individuals and
organizations, well-publicized DDoS attacks launched by foreign
entities and domestic criminals alike have endangered critical
infrastructures and put cyber-warriors on high alert. The study’s
respondents felt that a few critical network infrastructures in
particular were at risk: telecom and communications (93 percent of
respondents); transportation (70 percent); and power and water
utilities (63 percent).

Respondents indicated that attacks on their respective organizations
are occurring with increased frequency. A full 63 percent of
respondents reported seeing an increase in successful intrusions over
the past 12 months, likely by a nation or criminal syndicate.
Ironically, only 27 percent of respondents have witnessed a
corresponding increase in their respective companies’ cyber security
investments. (The majority believes that a lack of staffing and
governance is the top contributing factor to cyber security deficiency
— even more so than technology.)

Of those respondents whose organizations were attacked, most
determined the origin of the attack through signature (73 percent) or
traffic or network intelligence (50 percent). It appears that a
combination of signature-based security coupled with
non-signature-based approaches will be most effective. The most severe
attack vectors are SQL injection, client-side HTTP attacks, viruses and
insider threats. These attacks are considered severe because of their
consequences, such as theft of information assets and difficulty in
detecting, preventing or correcting effects of the attacks.

Seventy-seven percent of respondents believe criminal activities
evade their firewalls; 67 percent say they evade their
antivirus/antimalware systems; and 60 percent say they evade their
intrusion detection/prevention systems. Respondents believe stealth and
secrecy in security operations, education and training within the
enterprise, alignment of security with business objectives, and a
holistic approach (multiple complementary security software) to
enterprise security are necessary to create a strong security posture
in their respective organizations.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.