SlideShare a Scribd company logo
1 of 12
Download to read offline
Network
Security Survey
And recommendations for
improvements in 2017
Survey by Enterprise Management
Associates, sponsored by Ixia
are still not inspecting
live network traffic
Yet14%
Three out of four enterprises have been affected*
ATTACKS ARE COMMON
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cyberthreat Defense Report
F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
of monitoring tools don’t
match the speed of the link
they’re deployed on
And 26%
Impact the performance of network devices
NETWORK UPGRADES
E M A N E T W O R K S E C U R I T Y S U R V E Y
O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r
L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
Protects traffic from an offline security appliance
AN INTERNAL BYPASS
But 45%of appliances cannot
be updated while
network is available
A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e
L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches
E M A N E T W O R K S E C U R I T Y S U R V E Y
of security appliances do
not receive filtered traffic
Yet 40-50%
Annual IP traffic is expected to triple
over the next five years*
TRAFFIC IS EXPLODING
R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g
L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cisco Cloud Index
of tools are either
under- or over-utilized
But 63%
Should match enterprise needs without
over-investment
TOOL CAPACITY
S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c
L E A R N M O R E : https://www.ixiacom.com/securityfabric
E M A N E T W O R K S E C U R I T Y S U R V E Y
of staff time is spent
researching alerts and
configuring tools
And 25-50%
Is still a top concern of IT managers
SECURITY SKILLS GAP
B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e
L E A R N M O R E : https://www.ixiacom.com/products/threatarmor
E M A N E T W O R K S E C U R I T Y S U R V E Y
report IT budgets have
increased for the coming year
Around 80%
for network security in 2017
BUT THERE’S GOOD NEWS…
I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture
E M A N E T W O R K S E C U R I T Y S U R V E Y
Improve
Security
Invest in
Visibility
Recommendations for 2017
Deploy
Security Fabric
+ =
E M A N E T W O R K S E C U R I T Y S U R V E Y
Survey Demographics
< 500
< 1000
< 2500
< 5000
< 10000
10K+
20k+
13%
23%
20%
12%
16%
16%
10%
EMPLOYEES
5-20M
20-10M
100M-1B
1B+
Don't know
16%
31%
28%
20%
2% 2%
REVENUE
< 350k
< 1M
< 5M
< 10M
< 25M
< 50M
< 100M
100M+
Don’t know
1%
11%
17%
25%14%
15%
7%
7%
2%
IT BUDGET
E M A N E T W O R K S E C U R I T Y S U R V E Y
Complete survey results on SlideShare at: EMA Network Security Survey
For More Information
• Read the blog: Network Security Survey Finds Areas
for Improvement in 2017 .
• Learn how to make network security safer and more
resilient at:
www.ixiacom.com/solutions/inline-security-resilience
EMA Network Security Survey and Recommendations

More Related Content

What's hot

MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
Carlos Villafane
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
Mehul Doshi
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 

What's hot (20)

Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 
A Report on Cybersecurity
A Report on CybersecurityA Report on Cybersecurity
A Report on Cybersecurity
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate Reputation
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics Report
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challenges
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 

Viewers also liked

Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
 

Viewers also liked (20)

Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack Cloud
 
Deploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and StorageDeploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and Storage
 
17 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 201717 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 2017
 
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
 
Indice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentationIndice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentation
 
Why should anyone work here? | London Business School
Why should anyone work here? | London Business SchoolWhy should anyone work here? | London Business School
Why should anyone work here? | London Business School
 
Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
 
School for Change Agents - Module 4 Slides
School for Change Agents - Module 4 SlidesSchool for Change Agents - Module 4 Slides
School for Change Agents - Module 4 Slides
 
Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017
 
Why you should 10x your goals
Why you should 10x your goalsWhy you should 10x your goals
Why you should 10x your goals
 
Generation Z and the Future of Technology
Generation Z and the Future of TechnologyGeneration Z and the Future of Technology
Generation Z and the Future of Technology
 
How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...
 
Key technologies online 2017 final
Key technologies online 2017 finalKey technologies online 2017 final
Key technologies online 2017 final
 
Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
 
You Are Not As Rational As You Think
You Are Not As Rational As You ThinkYou Are Not As Rational As You Think
You Are Not As Rational As You Think
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 

Similar to EMA Network Security Survey and Recommendations

Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Similar to EMA Network Security Survey and Recommendations (20)

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for Marketers
 
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital MarketsHold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

EMA Network Security Survey and Recommendations

  • 1. Network Security Survey And recommendations for improvements in 2017 Survey by Enterprise Management Associates, sponsored by Ixia
  • 2. are still not inspecting live network traffic Yet14% Three out of four enterprises have been affected* ATTACKS ARE COMMON E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cyberthreat Defense Report F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
  • 3. of monitoring tools don’t match the speed of the link they’re deployed on And 26% Impact the performance of network devices NETWORK UPGRADES E M A N E T W O R K S E C U R I T Y S U R V E Y O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
  • 4. Protects traffic from an offline security appliance AN INTERNAL BYPASS But 45%of appliances cannot be updated while network is available A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 5. of security appliances do not receive filtered traffic Yet 40-50% Annual IP traffic is expected to triple over the next five years* TRAFFIC IS EXPLODING R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cisco Cloud Index
  • 6. of tools are either under- or over-utilized But 63% Should match enterprise needs without over-investment TOOL CAPACITY S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c L E A R N M O R E : https://www.ixiacom.com/securityfabric E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 7. of staff time is spent researching alerts and configuring tools And 25-50% Is still a top concern of IT managers SECURITY SKILLS GAP B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e L E A R N M O R E : https://www.ixiacom.com/products/threatarmor E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 8. report IT budgets have increased for the coming year Around 80% for network security in 2017 BUT THERE’S GOOD NEWS… I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 9. Improve Security Invest in Visibility Recommendations for 2017 Deploy Security Fabric + = E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 10. Survey Demographics < 500 < 1000 < 2500 < 5000 < 10000 10K+ 20k+ 13% 23% 20% 12% 16% 16% 10% EMPLOYEES 5-20M 20-10M 100M-1B 1B+ Don't know 16% 31% 28% 20% 2% 2% REVENUE < 350k < 1M < 5M < 10M < 25M < 50M < 100M 100M+ Don’t know 1% 11% 17% 25%14% 15% 7% 7% 2% IT BUDGET E M A N E T W O R K S E C U R I T Y S U R V E Y Complete survey results on SlideShare at: EMA Network Security Survey
  • 11. For More Information • Read the blog: Network Security Survey Finds Areas for Improvement in 2017 . • Learn how to make network security safer and more resilient at: www.ixiacom.com/solutions/inline-security-resilience