Operationalize Security To Secure Your Data Perimeter

Similar documents
Mastering The Endpoint

Vulnerability Management Trends In APAC

Evolve Your Security Operations Strategy To Account For Cloud

Modern Database Architectures Demand Modern Data Security Measures

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Build Your Zero Trust Security Strategy With Microsegmentation

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Business Success Through Embedded Communication Technology

Converged Infrastructure Matures And Proves Its Value

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Modern Compute Is The Foundation For Your IT Transformation

Fact Or Fiction: The State Of GDPR Compliance

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

Unlock The Value Of Cloud

Unlock The Value Of Cloud: A Spotlight On IT Executives

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Securing The Enterprise With Machine Identity Protection

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Protecting your data. EY s approach to data privacy and information security

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Enabling Zero Trust Security Through Network Virtualization And Micro- Segmentation

July 16, 2008 Updated: September 2, 2008 Inquiry Insights: Client Virtualization, Q by Natalie Lambert with Rachel Batiancila

Whitepaper. Advanced Threat Hunting with Carbon Black Enterprise Response

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

A Global Look at IT Audit Best Practices

ForeScout Extended Module for Splunk

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

MOVING MISSION IT SERVICES TO THE CLOUD

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

2018 Report The State of Securing Cloud Workloads

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Traditional Security Solutions Have Reached Their Limit

A Forrester Total Economic Impact Study Commissioned by ServiceNow January 2018

THALES DATA THREAT REPORT

Oracle bakes security into its DNA

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Workday s Robust Privacy Program

SIEM: Five Requirements that Solve the Bigger Business Issues

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

State of Cloud Survey GERMANY FINDINGS

Why Enterprises Need to Optimize Their Data Centers

Security Survey Executive Summary October 2008

THALES DATA THREAT REPORT

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

with Advanced Protection

IT Needs More Control

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Department of Management Services REQUEST FOR INFORMATION

Building a Threat Intelligence Program

2015 VORMETRIC INSIDER THREAT REPORT

Moving Workloads to the Public Cloud? Don t Forget About Security.

Introduction Assess Your Own Requirements To Choose Your Next Platform... 3

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

CYBERSECURITY RESILIENCE

Closing the Hybrid Cloud Security Gap with Cavirin

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Center Security On Advanced Technology

2017 THALES DATA THREAT REPORT

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Uncovering the Risk of SAP Cyber Breaches

HyTrust government cloud adoption survey

Cyber Security. June 2015

Abstract: Data Protection Cloud Strategies

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Corporate IT Survey Messaging and Collaboration, Editor: Sara Radicati, Ph.D

IT TRENDS REPORT 2016:

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

VERITAS 2017 TRUTH IN CLOUD REPORT

Sage Data Security Services Directory

THE STATE OF IT TRANSFORMATION FOR RETAIL

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

SD-WAN Networks Enable Modern Digital Business Ecosystems

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

FROM TACTIC TO STRATEGY:

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Information Security Controls Policy

Vulnerability Management Survey

Innovation Leaders Need IT Services To Drive Transformative Outcomes

Skybox Security Vulnerability Management Survey 2012

IT Risk & Compliance Federal

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

2018 Mobile Security Report

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Security in India: Enabling a New Connected Era

Transcription:

Operationalize Security To Secure Your Data Perimeter GET STARTED

Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security. In August 2017, IBM commissioned Forrester Consulting to conduct a custom survey of 127 IT and security decision makers across industries to explore how organizations are attempting to operationalize security in order to protect their vast stores of data. See the demographic breakdown for respondents below: Region Company size Department Job title 39% United States 27% China 25% Germany 9% Canada 13% 500 to 999 employees 42% 1,000 to 4,999 employees 20% 5,000 to 19,999 employees 25% 20,000+ employees 59% IT 41% Security and risk 28% Manager 31% Director 9% Vice president 31% C-level executive

1 Firms Are Confident In Their Ability To Define Their Data Perimeter The responsibility to secure mountains of data can be challenging. But fortunately, the vast majority of firms believe that they possess the technical details they need in order to accurately define their data perimeter. No small task, considering not just the amount of data, but the fact that the most critical data is sourced from multiple places. Though most firms source this critical data from internal databases, cloud providers, external devices, and vendors also come into play, further complicating matters. Defining a security perimeter is necessary in order to isolate and segment critical data away from other areas of the network where it would be more vulnerable.

1 2 3 Data Encryption Is Determined Via Classification Schemes Though regulations are certainly important, the majority of firms choose to encrypt their data based on specific classification schemes rather than on simple compliance. Classification schemes can be any system that indicates what needs to be protected. The US government, for instance, classifies data as unclassified, classified, secret, or top secret. Only 12% of respondents we surveyed said that they encrypt all of their data. NOT ALL DATA IS ENCRYPTED Shockingly, nearly half of firms say they encrypt little to none of their data. It would seem that although these organizations can define their data perimeter, they are not yet up to the task of securing it. Forty-six percent of organizations encrypt little to none of their data.

1 2 3 Operationalizing Security Is Critical To Protection Efforts Encryption issues aside, firms are clearly prioritizing data protection: 77% of firms protect their data above all else. 66% of respondents subscribe to a Zero Trust approach to security. Additionally, nearly three-quarters of firms note that operationalizing security to secure their data perimeters is a high priority. This indicates that many firms understand the need to move toward a more data-centric approach to security rather than concerning themselves with the legacy perimeters of yesterday. Despite the move towards operationalizing security and Zero Trust, more than 75% of firms still subscribe to a legacy perimeter approach to security.

1 2 3 Data Explosion Is The No. 1 Challenge To Operationalizing Security The main reason that legacy perimeter approaches to security are no longer sufficient today is because of the sheer amounts of data with which each firm must contend. Not surprisingly, nearly half of respondents note that the concept of a secure perimeter is no longer simple because of this data explosion. Identifying and classifying all the data that must be encrypted is also a barrier for 39% of respondents. And a quarter of respondents take it a step further, saying that bring-your-own-device (BYOD) cultures have completely obliterated the concept of a secure perimeter. Clearly, the perimeter approach is not the way to go anymore. Organizational issues shouldn t be ignored: 43% say that getting IT and security teams to work together effectively is a key challenge.

1 2 Firms Are Taking The Necessary Steps To Operationalize Security Despite the challenges, firms are moving in the right direction. The majority of organizations are continuously measuring for acceptable levels of risk, implementing access controls, and automating authorization and verification rules, which shows a decisive move toward operationalizing security. However, not everyone is there yet. A full third of firms are not currently assessing the totality of devices that touch their network, indicating that many are still only midjourney. Without a thorough understanding of applicable devices, organizations views of their data perimeter will remain incomplete, leaving them vulnerable to breaches. Data encryption remains a challenge for many, though 59% are currently working toward full encryption.

1 2 Operationalizing Security Benefits The Customer, The Brand, And The Bottom Line Security breaches are a clear threat to the livelihood of firms, resulting in costly remediation, damage to brand reputation, and reduced customer confidence. But this is not just about reducing breaches. When security is optimally operationalized, businesses experience increased customer trust, improved reputations, and improved customer acquisition and retention, in addition to simply cutting costs. When done right, protecting your data perimeter is not just about negating potential costs, but allowing firms to remove the stress of constant impending threats and focus more on the customer and their needs.

Conclusion Contending with the data explosion is no small feat for today s security professionals. In order to avoid costly breaches and win and retain their customers trust, firms must work to clearly define their data perimeter while operationalizing the security processes that protect it. By understanding the totality of devices that touch the network, enacting strict change management practices, and enforcing role-based access control across the enterprise, organizations will be better equipped to secure their customer s data, regardless of how much of it there is or where it s stored. METHODOLOGY This Technology Adoption Profile was commissioned by IBM. To create this profile, Forrester Consulting conducted a custom survey of 127 IT and security professionals at North American, German, and Chinese companies with at least 500 employees across industries. Respondents had to be responsible for their organization s security infrastructure and operations. The survey was completed in August 2017. For more information on Forrester s data panel and Tech Industry Consulting services, visit forrester.com. ABOUT FORRESTER CONSULTING Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting. Project Director Rachel Linthwaite Market Impact Consultant 2017, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to forrester.com. [1-141NZIQ]