Enterprise Strategy Group: Security Survey

Cisco Security
Cisco SecurityFounding Partner at Cisco Security
ESG Reports
Understand what your organization is up against
and where security is needed
Original survey question:
To the best of your knowledge,has your organization experienced
a technical error(i.e., misconfiguration that led to a security
vulnerability,performance problem, service interruption,etc.)
with changing or configuring networksin the last 12 months?
© 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Survey respondents:
154 network security-focusedIT professionalsat large midmarket
(500-999 employees) and enterprise-class(1,000+ employees)
organizationsin North America.
Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic
This InstaGraphicis based on research
conducted by ESG on behalf of:
Managing network segments, ACLs, and firewall rules is a complex process that can lead to human errors by
security and network operations teams.
of organizations report network
configuration errors have caused multiple
service outages over the last 12 months.
37%
Original survey question:
In your opinion, could some degree of further network segmentation
(i.e., segmentingservers with specific additional securitypolicies)
help preventa server compromise in your organization’s data
center?
© 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Survey respondents:
154 network security-focusedIT professionalsat large midmarket
(500-999 employees) and enterprise-class(1,000+ employees)
organizationsin North America.
Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic
This InstaGraphicis based on research
conducted by ESG on behalf of:
of organizations that have suffered lateral
data center server attacks have confidence
that additional network segmentation could
definitely prevent future compromises.
This validates that granular network segmentation can be used as a threat prevention best practice.
68%
Original survey question:
How would you characterize your organization’s method for
removing expired and/or out-of-date ACLs or firewall rules?
© 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Survey respondents:
130 network security-focusedIT professionalsat large midmarket
(500-999 employees) and enterprise-class(1,000+ employees)
organizationsin North America that have a methodof removing
expired ACL and/or firewall rules.
Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic
This InstaGraphicis based on research
conducted by ESG on behalf of:
of organizations with a method for
removing out-of-date ACL or firewall
rules say this process is difficult and
time-consuming.
68%
Original survey question:
On average, how long does the entire process take to make a
firewall or routing ACL change (i.e., the entire processfrom
request to production implementation)?
© 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved.
Survey respondents:
154 network security-focused IT professionals at large
midmarket (500-999 employees) and enterprise-class (1,000+
employees) organizations in North America.
Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic
This InstaGraphicis based on research
conducted by ESG on behalf of:
of organizations report that
– on average –
firewall or routing ACL changes
take days or weeks to complete.
74%
1 of 5

Recommended

Integrated Network Security Strategies by
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
3.5K views1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
The Evolution of and Need for Secure Network Access by
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
2.6K views11 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
2.2K views12 slides

More Related Content

What's hot

Introduction to Risk Management via the NIST Cyber Security Framework by
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
5.5K views20 slides
Darktrace white paper_ics_final by
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
2K views12 slides
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
1.3K views11 slides
What is Security Orchestration? by
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?Siemplify
136 views11 slides
Understanding cyber resilience by
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilienceChristophe Foulon, CISSP
1.7K views37 slides
How to implement NIST cybersecurity standards in my organization by
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
757 views14 slides

What's hot(20)

Introduction to Risk Management via the NIST Cyber Security Framework by PECB
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB 5.5K views
Darktrace white paper_ics_final by CMR WORLD TECH
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH2K views
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by Michael Bunn
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn1.3K views
What is Security Orchestration? by Siemplify
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
Siemplify136 views
An in depth understanding in the application of the zero-trust security model... by Max Justice
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice190 views
Gartner presentation risq dec 2016 jie zhang by ColloqueRISQ
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
ColloqueRISQ448 views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Google peter logli & jake shea by ColloqueRISQ
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
ColloqueRISQ223 views
Making Threat Modeling Useful To Software Development by ConSanFrancisco123
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
ConSanFrancisco1231.2K views
Addressing Healthcare Challenges Today by Ivanti
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
Ivanti207 views
Healthcare Cybersecurity Survey 2018 - Sirius by Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
Sirius1.5K views
Dragos 2019 ICS Year in Review by Dragos, Inc.
Dragos 2019 ICS Year in ReviewDragos 2019 ICS Year in Review
Dragos 2019 ICS Year in Review
Dragos, Inc.334 views
Cyber Kill Chain Deck for General Audience by Tom K
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
Tom K354 views
Survival of the Fittest: How to Build a Cyber Resilient Organization by Tripwire
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire3.8K views
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan by Tripwire
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire2K views
Dressing up the ICS Kill Chain by Dragos, Inc.
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
Dragos, Inc.2.8K views
Understanding Cyber Kill Chain and OODA loop by David Sweigert
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert3.5K views

Viewers also liked

2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
2.3K views24 slides
Defending the Data Center: Managing Users from the Edge to the Application by
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
1.1K views19 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide
From Physical to Virtual to Cloud by
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
1.7K views36 slides
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide
Cisco Web and Email Security Overview by
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
26.5K views51 slides

Viewers also liked(18)

2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
Cisco Security2.3K views
Defending the Data Center: Managing Users from the Edge to the Application by Cisco Security
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security1.1K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
From Physical to Virtual to Cloud by Cisco Security
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security1.7K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
Data Center Security Now and into the Future by Cisco Security
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security2.4K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views

Similar to Enterprise Strategy Group: Security Survey

Eng Solutions - Capability Statement-Latest by
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestHank Eng, CISSP, CISA, CISM
190 views6 slides
Big Data Impacts on Hybrid Infrastructure and Management by
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementEnterprise Management Associates
622 views37 slides
2015 Scalar Security Study Executive Summary by
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
528 views4 slides
Prevent & Protect by
Prevent & ProtectPrevent & Protect
Prevent & ProtectMike McMillan
118 views5 slides
Value Stories - 3rd issue - April 2019 by
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Redington Value Distribution
93 views24 slides
Implementing IT Security Controls by
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security ControlsThomas Jones
731 views8 slides

Similar to Enterprise Strategy Group: Security Survey(20)

2015 Scalar Security Study Executive Summary by patmisasi
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi528 views
Implementing IT Security Controls by Thomas Jones
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
Thomas Jones731 views
Sec 360 full course new by Laynebaril
Sec 360  full course newSec 360  full course new
Sec 360 full course new
Laynebaril86 views
Cybersecurity processes and technologies Information Systems homework help.docx by write31
Cybersecurity processes and technologies Information Systems homework help.docxCybersecurity processes and technologies Information Systems homework help.docx
Cybersecurity processes and technologies Information Systems homework help.docx
write316 views
Select and Implement a Next Generation Endpoint Protection Solution by Info-Tech Research Group
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Cybersecurity: Perceptions & Practices by Joseph DeFever
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
Joseph DeFever156 views
ZSAH Security - Web by Fahd Khan
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan150 views
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ... by CA Technologies
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
CA Technologies737 views
Security Analytics and Big Data: What You Need to Know by MapR Technologies
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies2.8K views
Cyber security white paper final PMD 12_28_16 by Dave Darnell
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
Dave Darnell399 views
Improving Incident Response: Building a More Efficient IT Infrastructure by Emulex Corporation
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
Emulex Corporation946 views
Proteus OCM Company Profile by KGanzy
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
KGanzy270 views
Adapt or Die: The Evolution of Endpoint Security by Tripwire
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint Security
Tripwire7.4K views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
1.7K views1 slide
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
7.3K views15 slides
Cisco 2014 Midyear Security Report by
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
2.4K views53 slides
String of Paerls Infographic by
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
1.4K views1 slide

More from Cisco Security(12)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
Cisco Security669 views

Recently uploaded

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
40 views69 slides
Democratising digital commerce in India-Report by
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
18 views161 slides
PRODUCT LISTING.pptx by
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 views1 slide
MVP and prioritization.pdf by
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
31 views8 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
14 views16 slides
NET Conf 2023 Recap by
NET Conf 2023 RecapNET Conf 2023 Recap
NET Conf 2023 RecapLee Richardson
10 views71 slides

Recently uploaded(20)

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
Future of AR - Facebook Presentation by ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf

Enterprise Strategy Group: Security Survey

  • 1. ESG Reports Understand what your organization is up against and where security is needed
  • 2. Original survey question: To the best of your knowledge,has your organization experienced a technical error(i.e., misconfiguration that led to a security vulnerability,performance problem, service interruption,etc.) with changing or configuring networksin the last 12 months? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: Managing network segments, ACLs, and firewall rules is a complex process that can lead to human errors by security and network operations teams. of organizations report network configuration errors have caused multiple service outages over the last 12 months. 37%
  • 3. Original survey question: In your opinion, could some degree of further network segmentation (i.e., segmentingservers with specific additional securitypolicies) help preventa server compromise in your organization’s data center? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations that have suffered lateral data center server attacks have confidence that additional network segmentation could definitely prevent future compromises. This validates that granular network segmentation can be used as a threat prevention best practice. 68%
  • 4. Original survey question: How would you characterize your organization’s method for removing expired and/or out-of-date ACLs or firewall rules? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 130 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America that have a methodof removing expired ACL and/or firewall rules. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations with a method for removing out-of-date ACL or firewall rules say this process is difficult and time-consuming. 68%
  • 5. Original survey question: On average, how long does the entire process take to make a firewall or routing ACL change (i.e., the entire processfrom request to production implementation)? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focused IT professionals at large midmarket (500-999 employees) and enterprise-class (1,000+ employees) organizations in North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations report that – on average – firewall or routing ACL changes take days or weeks to complete. 74%