0
Current and Future
State of IT Security
New generation of IT security threats:
A Dell-commissioned study by Vanson Bourne
Most firms aren’t sure if their
defenses are adequate. Are you?
87%
40%
have already experienced a security
breach (73% in ...
Attacks are mounting, with a large
percentage of breaches coming recently.
Percentage of firms experiencing a breach or
inc...
Is your company spending more
and still playing catch-up?
46%said budget constraints are a
major barrier to better securit...
In the last year, more companies
increased spending on employee
education and training than any
other security-related act...
No silver bullets—are you
addressing the right threats?
often spend time detecting potential
breaches on a monthly basis.
...
67%
18%
23%
62%
34%
27%
64%
44%
35%
Percentage of firms using
next-gen firewalls multi-factor authentication data science/an...
BYOD opens new doors. Are you
locking them behind you?
consider it important to implement
BYOD security policies.
consider...
Firms that rank “routine updating of
mobile devices” as one of their top
three strategies for preventing
security breaches...
Companies are heading to the cloud.
Are you safe there?
listed increased cloud usage as a
top-three threat in the next five...
Worldwide, only 46% of firms use
cloud security to help detect or
prevent security breaches.
Percentage of firms using cloud...
Mobile, cloud and big data computing
create great opportunities to drive business.
Dell is creating ways for you to embrac...
Vanson Bourne conducted 1,440 interviews with IT decision-makers from private sector
organizations with 500 or more employ...
Upcoming SlideShare
Loading in...5
×

Current and Future State of IT Security

1,204

Published on

Vanson Bourne conducted 1,440 interviews with IT decision-makers from private sector organizations with 500 or more employees and from public organizations with 500 or more end users. There were more than 450 participants from organizations with more than 5,000 employees. The interviews were conducted during October and November 2013 using both online and telephone methodologies with organizations from 10 different countries.

The slides here share key findings on the current and future state of IT security to help you to better understand how your approach compares to that of other organizations. Comparing your company to similar organizations across the globe may help you discover gaps in your current IT security strategy, opportunities you have to get ahead of the next generation of threats, and Dell's recommendations to help you optimize protection of your most valuable assets. Learn more: http://del.ly/ITSecurityTPO

Read more and download the Vanson Bourne research: http://del.ly/VansonBourneSecurity

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,204
On Slideshare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
31
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Transcript of "Current and Future State of IT Security"

  1. 1. Current and Future State of IT Security New generation of IT security threats: A Dell-commissioned study by Vanson Bourne
  2. 2. Most firms aren’t sure if their defenses are adequate. Are you? 87% 40% have already experienced a security breach (73% in the past year). 83%think their existing systems can identify a breach source immediately—but in actual attacks, on average, it took firms seven hours to detect a source. of respondents don’t think their security systems can fully protect them.
  3. 3. Attacks are mounting, with a large percentage of breaches coming recently. Percentage of firms experiencing a breach or incident of concern in the past six months.* (*six months from date of research) Education 42% Private Health care 50% Public 50% Higher Education 45% Excluding Higher Ed Financial Services (including insurance) 44% Consumer Products 42% Retail 42% Other Commercial Sector 41% Manufacturing 39%
  4. 4. Is your company spending more and still playing catch-up? 46%said budget constraints are a major barrier to better security. 74% of firms plan to increase IT security spending in the next three years. Organizations are far more likely to increase security spending after they’ve been attacked.
  5. 5. In the last year, more companies increased spending on employee education and training than any other security-related activity. Percentage of firms that increased employee training and education spending, by size of organization: 3,001 – 5,000 employees 73% 1,001 – 3,000 employees 70% 500 – 1,000 employees 67% 5001 – 10,000 employees 63% 10,000+ employees 54%
  6. 6. No silver bullets—are you addressing the right threats? often spend time detecting potential breaches on a monthly basis. Only Only list predicting and detecting unknown threats as a top-three concern. But only 18% 45% 37% rank unidentified threats as a top-tier concern. ?
  7. 7. 67% 18% 23% 62% 34% 27% 64% 44% 35% Percentage of firms using next-gen firewalls multi-factor authentication data science/analytics US China Spain
  8. 8. BYOD opens new doors. Are you locking them behind you? consider it important to implement BYOD security policies. consider it important to routinely update mobile devices. 23% 44% 57% listed mobile devices among their chief security threats. Only Only
  9. 9. Firms that rank “routine updating of mobile devices” as one of their top three strategies for preventing security breaches: 15% 32% UKSpain 18% 28% China India US France
  10. 10. Companies are heading to the cloud. Are you safe there? listed increased cloud usage as a top-three threat in the next five years. use cloud security.46% 49% 91% are either leveraging cloud resources or plan to. But only
  11. 11. Worldwide, only 46% of firms use cloud security to help detect or prevent security breaches. Percentage of firms using cloud security, by sector: 37% Public Health care 49% Private Education 45% Excluding Higher Ed 44% Higher Education Financial Services (including insurance) 43% Consumer Products 50% Retail 57% Other Commercial Sector 35% Manufacturing 59%
  12. 12. Mobile, cloud and big data computing create great opportunities to drive business. Dell is creating ways for you to embrace those technologies with confidence: • simplified, effective identity access management • end-to-end data encryption and protection • security embedded in every device • shared intelligence uniting security systems • preemptive measures leveraging big data and analytics • integrated systems allow automated compliance updates and reporting Because better security is better business. Learn more about Security solutions from Dell ›
  13. 13. Vanson Bourne conducted 1,440 interviews with IT decision-makers from private sector organizations with 500 or more employees and from public organizations with 500 or more end users. There were more than 450 participants from organizations with more than 5,000 employees. The interviews were conducted during October and November 2013 using both online and telephone methodologies with organizations from 10 different countries. About the Study Vanson Bourne is an independent specialist in market research for the technology sector. Our reputation for robust and credible research-based analysis, is founded upon rigorous research principles and our ability to seek the opinions of senior decision makers across technical and business functions, in all business sectors and all major markets. For more information, visit www.vansonbourne.com About Vanson Bourne
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×