Taking on Cyberthreats and DrivingValue with Managed SecurityA dangerous mix of stagnant budgets                          ...
Upcoming SlideShare
Loading in …5
×

Cybersecurity infographic

945 views

Published on

Factor in the security threat of mobile devices and the rise in compliance demands, and the situation threatens to spin out of control. CSC, in partnership with RSA and IDG Research, recently surveyed IT professionals across a wide array of industries on their top security challenges and concerns.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
945
On SlideShare
0
From Embeds
0
Number of Embeds
477
Actions
Shares
0
Downloads
32
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cybersecurity infographic

  1. 1. Taking on Cyberthreats and DrivingValue with Managed SecurityA dangerous mix of stagnant budgets Factor in the security threat of mobile devices and the rise in compliance demands, and the situation threatens to spin outand escalating cyberattacks is of control. CSC, in partnership with RSA and IDG Research,brewing into a perfect storm for IT recently surveyed IT professionals across a wide array ofdepartments everywhere. industries on their top security challenges and concerns. SECURITY THREATS DRIVING I.T. TO THE BREAKING POINT Cyberthreats are getting bigger and more sophisticated. In efforts to cause damage 2100% and steal data, hackers now deploy malware and viruses around the clock. 650% increase in reported cyberattacks from 2009 to 2011 on companies COMPANIES LOSE ABOUT that manage critical infrastructure.3 $338FROM CYBERCRIME PER YEAR BILLION 1 increase in cyberattacks on U.S. government agencies in last five years.2 57% OF RESPONDENTS CITED MOBILE CLIENTS AND UNMANAGED DEVICES "We need to build a trained and ready cyberforce with the right number and the right capacity. The conflict is growing, the probability for crisis is mounting." AS THE TOP I.T. SECURITY CHALLENGE. - Gen. Keith Alexander, Commander of U.S. Cyber Command.12 DEMAND FOR MANAGED SECURITY IS GROWING AT AN EXPLOSIVE RATE Faced with escalating security threats, Global outsourcing of security tightening regulations, constrained budgets spending is expected to more and limited skilled resources, more and more than double by 2015.4 companies are turning to Managed Security Service Providers (MSSPs) for relief. 14.8 bil $ 2015 I.T. BUDGETS WORLDWIDE ARE STAGNANT, $6.8 bil 2010 GROWING ONLY 1/2% IN 2012.5 1/3 OF RESPONDENTS THINK THEY ARE “No individual company can gather, process, filter and analyze the vast amount of data fast enough.” LIKELY TO START USING AN MSSP THIS YEAR. - Bernt Ostergaard, Current Analysis63 BENEFITS OF BRINGING ON MANAGED SECURITY SERVICES MSSPs have the perspective, economies Security effectiveness is best attained through a layered of scale and global reach to help set approach where individual elements can communicate, priorities and isolate vulnerabilities. making companies proactive, not reactive. LEVEL OF STRATEGIC PARTNERSHIP 3/4 4 NATIONAL RESPONSE TO CYBERTHREATS 3 SITUATIONAL AWARENESS AND INTELLIGENCE of respondents think improved effectiveness is the key benefit of hiring an MSSP. 2 INTEGRATED SECURITY OVERLAY 1 ASSURED SYSTEMS AND CONTENT RESPONDENTS BELIEVE MSSPS PROVIDE THESE VERY IMPORTANT OR CRITICAL BENEFITS: 66% 70% 68% 67% Operational Efficiency Knowledge Share Specialized Skills Cost ReductionForward-thinking IT departments are outsourcing security to dedicated MSSPsto get ahead of the latest threats while retaining oversight of security operations.This ensures the safety of intellectual property, better allocation of resources,reduced operational costs and greater peace of mind. CSC Managed Security Services Go to CSC.com to learn more about managed security helps clients unlock business value by in our survey, CSO Market Pulse: Approaches to IT Security and Maintaining Situational Awareness and the addressing all of their cybersecurity needs. accompanying white paper, The Security Landscape: Converging Waves of Pain.Sources: 1 Foreign Policy, July 2012. 3 CNN, July 4, 2012. 6 Yahoo! News, March 2012.CSO Market Pulse: Approaches to IT Security 2 Website of U.S. Government Accountability 4 Gartner Research, November 9, 2011. © 2012 COMPUTERand Maintaining Situational Awareness. Office, October 3, 2011. 5 Gartner Research, January 18, 2012. SCIENCES CORPORATION

×