• Like
  • Save

SolarWinds IT Security Survey - February 2013

  • 932 views
Uploaded on

SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, released the results of a survey on IT security and compliance that emphasize the growing need for …

SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, released the results of a survey on IT security and compliance that emphasize the growing need for powerful and easy-to-use security products focused on the key security concerns plaguing the majority of IT professionals.

The top IT security responsibilities, concerns and priorities revealed that securing today’s IT infrastructure will take a concerted and coordinated effort across all IT functions. Learn more.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
932
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SolarWinds Survey Reveals: Complex Security Tools are a Major Obstacle to Securing IT Are you facing IT security challenges? Learn how SolarWinds can help…© 2013, SolarWinds Worldwide, LLC. All rights reserved. 1
  • 2. IntroductionSolarWinds recently The Agendaconducted a survey on IT » Respondents – Who did weSecurity and Compliance survey?with participation from over » Results – What did they say?160 IT professionals. » Summary – What should you watch out for?We received some great » Key Takeaway – What does theinsight into the IT security survey mean to you?challenges faced by » Recommendation – What canorganizations. you do?Here are the facts…!!2013 IT SECURITY SURVEY – BY SOLARWINDS 2
  • 3. Whom did we Survey? 1 160+ Respondents Worldwide2013 IT SECURITY SURVEY – BY SOLARWINDS 3
  • 4. What are the top IT Security Concerns? 2 Top IT Security Concerns in Organizations Top 3 IT Security Concerns 1. Data loss 2. External threats 3. Cloud security and privacy2013 IT SECURITY SURVEY – BY SOLARWINDS 4
  • 5. What are the Top IT Security Priorities? 3 Top IT Security Priorities in Organizations Top 3 IT Security Priorities 1. Data loss 2. Endpoint Security 3. In correct / Unauthorized Device Configuration2013 IT SECURITY SURVEY – BY SOLARWINDS 5
  • 6. How Prepared are Organizations? 4 Compared to last year, how prepared are organizations to respond to IT security challenges? Nearly 50% of organizations feel they are not yet fully ready2013 IT SECURITY SURVEY – BY SOLARWINDS 6
  • 7. More Survey Results Growing need for powerful and easy-to-use security products focused on key security concerns plaguing the majority of IT professionals Interested to see more 86% of IT pros working on security survey results? were not security specialists 49% of respondents spent 40% or Click Here more of their time on IT security and compliance 7% of IT pros had security as their full-time job 2013 IT SECURITY SURVEY – BY SOLARWINDS 7
  • 8. What Should You Watch Out For? » The top five security and compliance responsibilities 1. Managing networks 2. Security infrastructure – firewalls, IDS/IPS, endpoint 3. Servers 4. Data exchange – email, file transfer, websites 5. Desktops and mobile devices (a tie) » The top three IT security and compliance concerns 1. Data loss 2. External threats 3. Cloud security and privacy » The No. 1 security priority is preventing Data Loss2013 IT SECURITY SURVEY – BY SOLARWINDS 8
  • 9. What Does The Survey Mean to You? » This is the right time to revisit your security closet and check if you have enough ammo to prevent security threats. » You need to be able to  Know what threats you are up against – internal or external  Identify threats in real-time  Take preventative action in real-time  Analyze the sources and causes of threats  Ensure to pre-empt threats from known sources  Ensure proper compliance with organizational and federal IT security policies2013 IT SECURITY SURVEY – BY SOLARWINDS 9
  • 10. Recommendations» Analyze all the threats and increasing sources and means of IT security attacks» Prepare a security checklist to see if you’ve got your IT infrastructure and corporate confidential data covered in all areas of the IT landscape» Evaluate your options for instituting the best solution to address the security concerns in different areas of IT management» Some key areas that you need to equip yourself are:  Log and Event Management  Firewall Security Management  Network Change & Configuration Management  Endpoint Vulnerability Management  Endpoint Data Loss Preventions» You can read more from this IT Security Management Checklist whitepaper IT Security Whitepaper: 9 Key Recommendations to Keep Your Network Safe Management Checklist 2013 IT SECURITY SURVEY – BY SOLARWINDS 10
  • 11. Thank You!2013 IT SECURITY SURVEY – BY SOLARWINDS 11