2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud

2,531 views

Published on

Thanks to you, the audience at UltimateWindowsSecurity, for the 2014 Survey. It was a great success with over 600 respondents! I appreciate all of you who took the time give me your thoughts.

You’ve provided some great ideas for real training for free™ in the coming year and I’ve learned which topics are most important to you. That’s going to benefit all of us.

In this presentation, we'll present our findings. We’ll talk about the community’s top goals for 2014, which topics you recommended I cover in 2014 and what our community sees as the greatest security concerns for 2014. And we’ll discuss other trends emerging from the data.

Find out about the top trends, such as:

SIEM – What are the top SIEM solutions? What is the UWS community’s top 3 biggest challenges with log/monitoring/security analytics?
Endpoint Security – How widely is application whitelisting being used and what is driving its adoption? Which endpoint security technologies really work and which are just hype?
Mobile Devices – Are employee owned mobile devices supported at your organization? Is your biggest concern with mobile devices malware, data loss, compliance?
The Cloud – How widely are your peers embracing the cloud? Is your organization’s security policy, technology and training keeping up with the move to the cloud?
Advanced Security Topics – What are your peers doing about “big data”? What about endpoints as sensors, and other new security approaches?

This will be a fact-filled and fascinating presentation on where we are and where we are going on a host of different security fronts. Don’t miss it.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,531
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
43
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud

  1. 1. 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud © 2013 Monterey Technology Group Inc. Sponsored by
  2. 2. Thanks to © 2013 Monterey Technology Group Inc. www.Lumension.com
  3. 3.  Who are we?  SIEM/Monitoring  Top priorities 2014  Top risks 2014 Preview of Key Points  Webinar topics for 2014  Application control  Virtualization  Cloud  Mobile  Future
  4. 4. 1 to 9 5.2% 10 to 49 6.4% 50 to 99 5.5% 5,000+ 33.2% What’s your size? 100 to 499 16.1% 500 to 999 8.9% 2,000 to 4,999 13.0% 1,000 to 1,999 11.7%
  5. 5. Industry Financial Services High Technology Professional Services Healthcare Public Sector (State & Local Government) Education and Research Public Sector (Federal Government) Aerospace & Defense Communications Industrial Manufacturing Retail Utilities Media and Entertainment Travel & Transportation Consumer Goods Oil & Gas Engineering and Construction Automotive Chemicals Natural Resources 0.0% 5.0% 10.0% 15.0% 20.0% 25.0%
  6. 6. 7% Who are you? 26% Technical Manager / Director VP and above 67%
  7. 7. 4.4% North America (US and Canada) 15.2% Americas (outside NA) Where are you? 4.1% United Kingdom 2.4% EMEA (Europe, Middle East, Africa) 73.8% APAC (Asia Pacific)
  8. 8. Biggest challenge with SIEM? 3%4% 16% Resources 18% Analysis Volume Cooperation 5% Technology Management 17% 37% Realtime SIEM Product
  9. 9.  Logging  Event forwarding  Event correlation  Applications     Webinar topics for 2014 SQL Exchange SharePoint More  Linux/Unix  Cloud audit logging  VMWare  APTs  Prevention  Detection  Endpoint  BitLocker vs other solutions  Monitoring endpoints  Mobile security  Virtualization security  Data protection
  10. 10. Compliance Monitoring Client Security Top Priorities for 2014 0% 0% 1%1% 3% 1% 3% 3% 3% 3% 4% Business 15% Misc IT Misc Security Network Security 13% 4% Patch mgt Data Loss Prevention 4% Vulnerability Management 11% 4% 4% 5% 6% 10% IAM and Authentication Awareness Virtualization Quantified Risks Training Cloud
  11. 11.  Winner: Malware  Sophistication  Desktop/Laptop  Mobile device  Runners up Greatest Risks for 2014     Application vulnerabilities Data security in the cloud OS vulnerabilities Spear Phishing attacks  Other  End-user security awareness  Data loss/leakage  Insider  APT  IAM  Rights  Privileged accounts OTHER DDOS ATTACKS MAN-IN-THE-MIDDLE OR OTHER BROWSER ATTACKS MALWARE VIA MOBILE DEVICES (E.G., SMARTPHONES, TABLETS) SPEAR PHISHING ATTACKS 6.1% 15.0% 19.8% 33.5% 35.4% OS VULNERABILITIES 36.9% DATA SECURITY IN THE CLOUD 37.1% APPLICATION VULNERABILITIES 42.7% MALWARE VIA ENDPOINT (E.G., DESKTOP, LAPTOP) 46.5% MALWARE SOPHISTICATION 46.9%
  12. 12.  What do you currently/plan to virtualize? 100% 90% 80% 70% 60% Virtualization 50% 40% 30% 20% 10% 0% Servers Endpoints Applications Mobile Other No Plans 4.62% 39.83% 31.89% 70.71% 90.04% Plan to Deploy 5.05% 23.09% 21.21% 13.85% 5.34% Currently Deployed 90.33% 37.09% 46.90% 15.44% 4.62%
  13. 13. Perceived effectiveness of security technologies Other Mobile device management (MDM) Personal firewalls Application Control Application control (whitelisting) Endpoint data loss prevention (DLP) Anti-spyware Host-based intrusion prevention Port and device control Anti-malware Vulnerability assessment Full-disk and file encryption (mobile data protection) 50 55 60 65 70 75
  14. 14. Perceived effectiveness of whitelisting between current/planned/non-users Application Control
  15. 15. 6% Mobile Devices 9% Employee-Owned Only 27% Corporate-Owned Only Mix None 58%
  16. 16. Biggest concern regarding mobile devices Mobile Devices
  17. 17. Is your organization moving towards adopting clouddelivered applications? Cloud usage
  18. 18. For those moving to the cloud, is security keeping up? Cloud usage
  19. 19. We asked about personal and business cloud usage in the organization … Do you allow personal cloud applications on your endpoints? Cloud Usage Do you have policies restricting data being moved to and from the personal cloud? Do you have enforcement mechanisms managing data being moved to and from the personal cloud? Does your organization have a business cloud for data storage and exchange of files? Yes (37.3%) Yes (51.8%) No (62.7%) No (48.2 %) No (81.1%) Yes (39.2%) No (60.8%)
  20. 20. What metrics does your management measure you on? Metrics (alt. view) other
  21. 21. We asked several questions about where endpoint security was headed … Changing Security Paradigms
  22. 22.  Security analytics is here to stay at UWS  Mobile, APT, Malware and Data Loss are foremost on the risk radar  Endpoint security is a common denominator for all of them Bottom line  Endpoint security more important than ever  Mobile device trend reinforces this  Cloud trend is limited and does not change this  Virtualization of endpoints and application delivery is a complementary issue  What’s happening at endpoint security leader Lumension?
  23. 23. Additional Information www.lumension.com/endpoint-management-security-suite/buy-now.aspx

×