SlideShare a Scribd company logo
1 of 12
Download to read offline
Network
Security Survey
And recommendations for
improvements in 2017
Survey by Enterprise Management
Associates, sponsored by Ixia
are still not inspecting
live network traffic
Yet14%
Three out of four enterprises have been affected*
ATTACKS ARE COMMON
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cyberthreat Defense Report
F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
of monitoring tools don’t
match the speed of the link
they’re deployed on
And 26%
Impact the performance of network devices
NETWORK UPGRADES
E M A N E T W O R K S E C U R I T Y S U R V E Y
O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r
L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
Protects traffic from an offline security appliance
AN INTERNAL BYPASS
But 45%of appliances cannot
be updated while
network is available
A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e
L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches
E M A N E T W O R K S E C U R I T Y S U R V E Y
of security appliances do
not receive filtered traffic
Yet 40-50%
Annual IP traffic is expected to triple
over the next five years*
TRAFFIC IS EXPLODING
R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g
L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cisco Cloud Index
of tools are either
under- or over-utilized
But 63%
Should match enterprise needs without
over-investment
TOOL CAPACITY
S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c
L E A R N M O R E : https://www.ixiacom.com/securityfabric
E M A N E T W O R K S E C U R I T Y S U R V E Y
of staff time is spent
researching alerts and
configuring tools
And 25-50%
Is still a top concern of IT managers
SECURITY SKILLS GAP
B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e
L E A R N M O R E : https://www.ixiacom.com/products/threatarmor
E M A N E T W O R K S E C U R I T Y S U R V E Y
report IT budgets have
increased for the coming year
Around 80%
for network security in 2017
BUT THERE’S GOOD NEWS…
I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture
E M A N E T W O R K S E C U R I T Y S U R V E Y
Improve
Security
Invest in
Visibility
Recommendations for 2017
Deploy
Security Fabric
+ =
E M A N E T W O R K S E C U R I T Y S U R V E Y
Survey Demographics
< 500
< 1000
< 2500
< 5000
< 10000
10K+
20k+
13%
23%
20%
12%
16%
16%
10%
EMPLOYEES
5-20M
20-10M
100M-1B
1B+
Don't know
16%
31%
28%
20%
2% 2%
REVENUE
< 350k
< 1M
< 5M
< 10M
< 25M
< 50M
< 100M
100M+
Don’t know
1%
11%
17%
25%14%
15%
7%
7%
2%
IT BUDGET
E M A N E T W O R K S E C U R I T Y S U R V E Y
Complete survey results on SlideShare at: EMA Network Security Survey
For More Information
• Read the blog: Network Security Survey Finds Areas
for Improvement in 2017 .
• Learn how to make network security safer and more
resilient at:
www.ixiacom.com/solutions/inline-security-resilience
EMA Network Security Survey and Recommendations

More Related Content

What's hot

Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyCigniti Technologies Ltd
 
A Report on Cybersecurity
A Report on CybersecurityA Report on Cybersecurity
A Report on CybersecurityPulse Q&A
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate ReputationIpsos UK
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportJeremiah Grossman
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchMehul Doshi
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteJeremiah Grossman
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesSynopsys Software Integrity Group
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersVenafi
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Catalyst Balkans
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights Lori MacVittie
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking PointVenafi
 

What's hot (20)

Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 
A Report on Cybersecurity
A Report on CybersecurityA Report on Cybersecurity
A Report on Cybersecurity
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate Reputation
 
WhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics ReportWhiteHat Security 8th Website Security Statistics Report
WhiteHat Security 8th Website Security Statistics Report
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challenges
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)Nonprofit Tech Needs - Western Balkans (presentation)
Nonprofit Tech Needs - Western Balkans (presentation)
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report
 
State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights State of Application Delivery 2017 - Cloud Insights
State of Application Delivery 2017 - Cloud Insights
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 

Viewers also liked

Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)Thomas BART
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017John Maeda
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudLora O'Haver
 
Deploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and StorageDeploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and StorageLora O'Haver
 
17 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 201717 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 2017Excel Strategies LLC
 
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017Société Tripalio
 
Indice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentationIndice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentationAmelle Nebia
 
Why should anyone work here? | London Business School
Why should anyone work here? | London Business SchoolWhy should anyone work here? | London Business School
Why should anyone work here? | London Business SchoolLondon Business School
 
Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeAjin Abraham
 
School for Change Agents - Module 4 Slides
School for Change Agents - Module 4 SlidesSchool for Change Agents - Module 4 Slides
School for Change Agents - Module 4 SlidesNHS Horizons
 
Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Nathan Pacer
 
Why you should 10x your goals
Why you should 10x your goalsWhy you should 10x your goals
Why you should 10x your goalsJAMSO
 
Generation Z and the Future of Technology
Generation Z and the Future of TechnologyGeneration Z and the Future of Technology
Generation Z and the Future of TechnologyPamela Pavliscak
 
How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...Ofsted
 
Key technologies online 2017 final
Key technologies online 2017 finalKey technologies online 2017 final
Key technologies online 2017 finalRussell Stannard
 
Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9NVIDIA
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017Capgemini
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Scott Levine
 
You Are Not As Rational As You Think
You Are Not As Rational As You ThinkYou Are Not As Rational As You Think
You Are Not As Rational As You ThinkYang Ao Wei 楊翱維
 

Viewers also liked (20)

Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
 
Design in Tech Report 2017
Design in Tech Report 2017Design in Tech Report 2017
Design in Tech Report 2017
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack Cloud
 
Deploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and StorageDeploying OpenStack with Cisco Networking, Compute and Storage
Deploying OpenStack with Cisco Networking, Compute and Storage
 
17 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 201717 Excel shortcuts to learn in 2017
17 Excel shortcuts to learn in 2017
 
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
 
Indice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentationIndice de bienveillance des marques - Agence Change 2017 présentation
Indice de bienveillance des marques - Agence Change 2017 présentation
 
Why should anyone work here? | London Business School
Why should anyone work here? | London Business SchoolWhy should anyone work here? | London Business School
Why should anyone work here? | London Business School
 
Injecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at RuntimeInjecting Security into vulnerable web apps at Runtime
Injecting Security into vulnerable web apps at Runtime
 
School for Change Agents - Module 4 Slides
School for Change Agents - Module 4 SlidesSchool for Change Agents - Module 4 Slides
School for Change Agents - Module 4 Slides
 
Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017Venture Scanner Fintech Report Q1 2017
Venture Scanner Fintech Report Q1 2017
 
Why you should 10x your goals
Why you should 10x your goalsWhy you should 10x your goals
Why you should 10x your goals
 
Generation Z and the Future of Technology
Generation Z and the Future of TechnologyGeneration Z and the Future of Technology
Generation Z and the Future of Technology
 
How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...How Ofsted evaluates special educational needs and disabilities provision in ...
How Ofsted evaluates special educational needs and disabilities provision in ...
 
Key technologies online 2017 final
Key technologies online 2017 finalKey technologies online 2017 final
Key technologies online 2017 final
 
Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9Top 5 Deep Learning and AI Stories 3/9
Top 5 Deep Learning and AI Stories 3/9
 
Payments Trends 2017
Payments Trends 2017Payments Trends 2017
Payments Trends 2017
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
 
You Are Not As Rational As You Think
You Are Not As Rational As You ThinkYou Are Not As Rational As You Think
You Are Not As Rational As You Think
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 

Similar to EMA Network Security Survey and Recommendations

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility Rick Huijbregts
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityTenable Network Security
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Enterprise Management Associates
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataEnterprise Management Associates
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for MarketersRashish Pandey
 
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital MarketsHold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital Marketsaccenture
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)Jill Coveney
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 

Similar to EMA Network Security Survey and Recommendations (20)

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility
 
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' CybersecurityNaughty or Nice? Holidays Stress Merchants' Cybersecurity
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for Marketers
 
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital MarketsHold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)The rackspace difference v1 2016_10_03 (1)
The rackspace difference v1 2016_10_03 (1)
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

EMA Network Security Survey and Recommendations

  • 1. Network Security Survey And recommendations for improvements in 2017 Survey by Enterprise Management Associates, sponsored by Ixia
  • 2. are still not inspecting live network traffic Yet14% Three out of four enterprises have been affected* ATTACKS ARE COMMON E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cyberthreat Defense Report F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
  • 3. of monitoring tools don’t match the speed of the link they’re deployed on And 26% Impact the performance of network devices NETWORK UPGRADES E M A N E T W O R K S E C U R I T Y S U R V E Y O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
  • 4. Protects traffic from an offline security appliance AN INTERNAL BYPASS But 45%of appliances cannot be updated while network is available A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 5. of security appliances do not receive filtered traffic Yet 40-50% Annual IP traffic is expected to triple over the next five years* TRAFFIC IS EXPLODING R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cisco Cloud Index
  • 6. of tools are either under- or over-utilized But 63% Should match enterprise needs without over-investment TOOL CAPACITY S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c L E A R N M O R E : https://www.ixiacom.com/securityfabric E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 7. of staff time is spent researching alerts and configuring tools And 25-50% Is still a top concern of IT managers SECURITY SKILLS GAP B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e L E A R N M O R E : https://www.ixiacom.com/products/threatarmor E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 8. report IT budgets have increased for the coming year Around 80% for network security in 2017 BUT THERE’S GOOD NEWS… I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 9. Improve Security Invest in Visibility Recommendations for 2017 Deploy Security Fabric + = E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 10. Survey Demographics < 500 < 1000 < 2500 < 5000 < 10000 10K+ 20k+ 13% 23% 20% 12% 16% 16% 10% EMPLOYEES 5-20M 20-10M 100M-1B 1B+ Don't know 16% 31% 28% 20% 2% 2% REVENUE < 350k < 1M < 5M < 10M < 25M < 50M < 100M 100M+ Don’t know 1% 11% 17% 25%14% 15% 7% 7% 2% IT BUDGET E M A N E T W O R K S E C U R I T Y S U R V E Y Complete survey results on SlideShare at: EMA Network Security Survey
  • 11. For More Information • Read the blog: Network Security Survey Finds Areas for Improvement in 2017 . • Learn how to make network security safer and more resilient at: www.ixiacom.com/solutions/inline-security-resilience