Lack of knowledge leads to ineffective malware defenses and lengthy detection timeframes.
Q&A is meant to cut through vendor spin and help users understand and benefit from big data security analytics.
Mobile computing is well beyond a fad for e-mail enablement; enterprise organizations are undertaking mobile computing initiatives for new business processes and creative applications that reach employees, customers, and even business partners. When mobile devices were first implemented, CIOs turned to Mobile Device Management (MDM) platforms to onboard and manage devices, but MDM really doesn’t protect employees when they use mobile browsers or applications on the devices themselves. As mobile computing evolves, CISOs are implementing their own mobile security solutions for malware protection and application controls. Cloud-based mobile security solutions that integrate with traditional MDM are becoming popular choices for these requirements.
Since the term “cyber Pearl Harbor” was first coined during the Clinton administration, the U.S. government has warned about cybersecurity dangers but done little to protect the nation. Earlier this year, President Obama issued an executive order to address cybersecurity, but others in Washington view this as a political move and remain cynical about any real cybersecurity threat. Is the cyber threat real and if so, what should the U.S. Federal Government do about it? To answer this question, ESG surveyed 315 security professionals working at U.S.-based enterprise organizations (i.e., 1,000 or more employees). This well-informed group of cybersecurity “insiders” is much more certain than DC pundits, think tanks, and legislators—they firmly believe that cybersecurity threats are real and want to see more from Washington in response.
IT scale and sophisticated malware make insider attacks more difficult to prevent and detect.
DHS/Mitre standards could help users and security technology vendors benefit from an avalanche of security intelligence.
Consulting, implementation, and managed services align with Cisco goals and customer needs.
Spending is up but attitudes toward traditional antivirus software are way down.
APTs first came on the scene in 2010, creating a wave of fear, hype, and activity. Many organizations increased their spending on information security and believed they were making progress, but ESG research indicates that nearly half of enterprise organizations are still regularly compromised by modern malware. While there is no single solution to this problem, CISOs can improve the efficacy of their threat defenses and security operations by integrating security intelligence into their security technologies and infrastructures. Webroot, a security intelligence leader, is partnering with a number of security device vendors to offer a strong combination of modern malware defenses and integrated security intelligence.
The malware threat landscape is getting worse and many large organizations continue to suffer security breaches as a result. Why? Enterprises often lack the right security skills and their current defenses and security analytics are no match for increasingly sophisticated and stealthy targeted attacks. Fortunately, large organizations recognize these gaps and are increasing security budgets to bolster malware prevention, detection, and response. To benefit from these investments as soon as possible, CISOs should improve malware knowledge, invest in security analytics, and deploy modern anti-malware technologies on networks and hosts.
The primary objective of this ESG research study was to survey security professionals working at enterprise organizations (i.e., 1,000 employees or more) in order to better understand their opinions, experiences, and skills as they pertain to modern malware. Furthermore, ESG wanted to understand how large organizations are preventing, detecting, and responding to malware attacks on a regular basis and what, if anything, is changing.
Company can build on current offering, upset the endpoint security market, and benefit from enterprise security trends.
Enterprises must address the historical separation of organizations and tools with an integration strategy.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188