SlideShare a Scribd company logo
2011 Threat Management Survey
Global Data
Methodology
• Survey performed by Applied Research
• 1,025 global enterprises
• Tactical IT, Strategic IT and
  C-level professionals
• Cross-industry




                                         2
Key Findings
• Enterprises not confident in their security posture
• Organizations struggling with timely analysis and response
• Top concerns are security intelligence and visibility
• Staffing problems top list of issues impacting ability to respond to new and
  emerging threats




                                                                                 3
Security Confidence
• 57% lack confidence in IT security staffs’ ability to respond to new threats
• Why? Several of the factors tied to staffing
  – Not enough staff
  – Staff lacks time




                                                                                 4
Staffing Issues
• 66% rate staff as less than effective
• Only 4% rate staff as completely effective
• Why?
  – Recruiting
  – Retention
  – Right skill sets
Top Security Concerns
• Intelligence
• Visibility
• Analysis




                        6
Security Shortcomings
• Timely and quality alert correlation/analysis
• Timely and effective event response




                                                  7
Symantec Recommendations
• Build a comprehensive incident management program
• Be vigilant about the changing threat landscape
• Broaden the visibility across your infrastructure
• Evaluate systems for managing security information and alerts
Appendix
All questions included


                         9
Demographics


               10
Q2: How many employees does your organization have in all
                                      locations worldwide?


1,000 to 2,499                                                              33%




2,500 to 4,999                                                              33%




5,000 or more                                                                 34%




                 0%        5%       10%     15%      20%     25%      30%           35%   40%
                                                                                           11
Q3: What is your organization's primary industry?
                                                       Advertisement          1%
                                                               Media               2%
      Living-related and personal services and amusement services                  2%
                                                                Legal              2%
                                                              Energy               2%
Transport and freight service (cover such as Airline/railway industry)                   3%
                                                              Internet                   3%
                     Eating and drinking services, accommodations                        3%
                           Real estate and goods rental and leasing                           4%
                                                         Government                           4%
                                   Education, Learning and Support                            4%
                                                        Construction                                5%
                                   Medical, Health Care and Welfare                                      6%
                                                       Manufacturing                                                9%
                                                                Other                                                    10%
                                                Wholesale and Retail                                                     10%
             Scientific research, professional and technical services                                                    10%
                       Information Technology and Communications                                                         10%
                                              Finance and Insurance                                                      10%
                                                                         0%         2%         4%         6%   8%          10%   12%
                                                                                                                                  12
Q4: What is your primary role?


                              Manage our computing resources                                   25%




Management role in IT, primarily focused on tactical/operational
                                                                                               25%
                           issues




   Management role in IT, primarily focused on strategic issues                                25%




                                     C-level or business owner                                 25%



                                                                   0%   5%   10%   15%   20%     25%   30%
                                                                                                        13
Q5: What is your title?
                                                 President              2%

                                                    Owner          3%

                                                   Partner         1%

                                                       CIO                                               25%

                                                      CTO                5%

                                                     CISO          1%

Vice President or Senior Vice President in a computing area             4%

                               Director in a computing area                       9%

    Manager of Information Systems or Computer Systems                                             22%

                                          Systems analyst                              12%

                                         Systems architect         3%

                                         Systems designer          3%

                                                     Other                             11%

                                                              0%             5%        10%   15%   20%     25%   30%
                                                                                                                  14
What is your age?

     50 or older (Boomer)
             10%            30 or less (Millennial)
                                     22%




31 to 49 (Gen-X)
      68%




                                                      15
Q7: What is your gender?

Female
 19%




                              Male
                              81%




                                     16
Q8: How many years have you been working in computer systems
                           and technology?
14


                12.88
12
                                                     12

10



 8



 6



 4



 2



 0
                Mean                                Median
                                                                    17
Q9: What are your company's annual revenues?
                Less than $500,000         2%

             $500,000 to $2,000,000             3%

           $2,000,000 to $7,500,000             4%

          $7,500,000 to $30,000,000                       5%

        $30,000,000 to $100,000,000                                      9%

      $100,000,000 to $500,000,000                                                        15%

     $500,000,000 to $1,500,000,000                                                             16%

   $1,500,000,000 to $5,000,000,000                                                             16%

  $5,000,000,000 to $25,000,000,000                                                             16%

$25,000,000,000 to $100,000,000,000                            7%

        More than $100,000,000,000                                  7%

                                      0%   2%        4%        6%        8%   10%   12%   14%     16%   18%
                                                                                                         18
Q10: Characterize your company's year-over-year annual growth
                               rate in terms of annual revenue:
                         Decline to state        3%

     Growing at 100% per year or more            0%

         Growing at 50 to 99% per year                 5%

         Growing at 25 to 49% per year                       7%

Growing at between 10 to 24% per year                                                          29%

   Growing at between 1 to 9% per year                                                               31%

      Flat: Neither growing nor declining                              11%

  Declining at between 1 to 9% per year                4%

Declining at between 10 to 24% per year                           9%

      Declining 25% per year or greater           1%

                                            0%              5%         10%   15%   20%   25%         30%   35%
                                                                                                            19
Security Self-Assessment


                           20
Q213: How confident are you that your IT security staff can handle
                  new security threats in a timely and effective manner?

      Very confident                                       19%




 Somewhat confident                                                      25%




            Neutral                                        19%




Somewhat concerned                                       18%




     Very concerned                                              20%


                       0%   5%         10%         15%             20%         25%   30%
                                                                                      21
Q214: What are the top three factors that are keeping you from
                  being completely confident in your ability to handle new security
                            threats in a timely and effective manner?
                                        (Ranked 1, 2, or 3)

No access to latest information about new threats, vulnerabilities, etc.                                             36%


                   Security staff lacks necessary experience/skill sets                                                    39%


 Trouble responding to security incidents in a timely/effective manner                                                           43%


                                       Staff doesn't have enough time                                                              45%


  Trouble correlating/analyzing security alerts as they are happening                                                              45%


         Not enough visibility into security across entire infrastructure                                                          45%


                                               Insufficient security staff                                                             46%

                                                                             0%   5%   10%   15%   20%   25%   30%     35%       40%    45%   50%
                                                                                                                                               22
Security Lifecycle


                     23
Q215: Please review the following aspects of security and rank
                   them in terms of what concerns you the most.
100%

90%                                                       17%                18%
                                     24%

80%            41%

                                                                             20%
70%                                                       28%
                                     25%
60%
                                                                                            1
50%                                                                          25%            2
               27%                                                                          3
40%                                                       28%
                                     28%                                                    4

30%

               19%
20%                                                                          38%
                                                          27%
10%                                  23%
               13%
 0%
       Security intelligence   Security visibility   Attack analysis   Security response
                                                                                           24
Q215: Please review the following aspects of security and rank
                   them in terms of what concerns you the most.
                                 (Average Ranks)
    Security intelligence   Security visibility   Attack analysis   Security response
0




1




2               2.04

                                    2.50
                                                       2.64
                                                                           2.82

3




4
                                                                                        25
Q216: Please rank these aspects in terms of your organization's
                                ability to execute.
100%

90%                                                       19%                17%
                                     26%
80%            38%

                                                                             21%
70%
                                                          25%

60%                                  26%
                                                                                            1
50%                                                                          24%            2
               29%
                                                                                            3
40%                                                       29%
                                                                                            4
                                     28%
30%
               19%
20%                                                                          38%
                                                          26%
10%                                  21%
               15%

 0%
       Security intelligence   Security visibility   Attack analysis   Security response
                                                                                           26
Q216: Please rank these aspects in terms of your organization's
                                ability to execute.
                                (Average Ranks)
    Security intelligence   Security visibility   Attack analysis   Security response
0




1




             2.10
2
                                    2.44
                                                       2.62
                                                                          2.83

3




4
                                                                                        27
Q217: When it comes to keeping up with the latest cyber-security
          vulnerabilities and threats, please rate how you are doing in the
                                   following areas:
       1 - Extremely poor     2 - Somewhat poor         3 - Neither poor nor well    4 - Somewhat well        5 - Extremely well
100%

90%
                                 24%                                                                27%
80%

70%

60%
                                 41%
                                                                                                    40%
50%

40%

30%
                                 25%
20%                                                                                                 26%

10%
                                 7%
                                                                                                      5%
 0%                              3%                                                                   1%
            Acquiring such intelligence in a timely fashion                         The quality of intelligence you gather
                                                                                                                                   28
Q217: When it comes to keeping up with the latest cyber-security
                vulnerabilities and threats, please rate how you are doing in the
                                         following areas.
                                   (Somewhat/Extremely well)



        The quality of intelligence you gather                                             68%




Acquiring such intelligence in a timely fashion                                       65%




                                                  0%   10%   20%   30%   40%   50%   60%         70%   80%
                                                                                                        29
Q217: When it comes to keeping up with the latest cyber-security
                vulnerabilities and threats, please rate how you are doing in the
                                         following areas.
                                  (Somewhat/Extremely poorly)



        The quality of intelligence you gather                   6%




Acquiring such intelligence in a timely fashion                              10%




                                                  0%   2%   4%   6%   8%      10%   12%
                                                                                     30
Q218: When it comes to maintaining visibility into security across
         the entire company's infrastructure, please rate how you are doing
                          in each of the following areas:
       1 - Extremely poor        2 - Somewhat poor      3 - Neither poor nor well       4 - Somewhat well      5 - Extremely well
100%

90%                                                                 21%                                          22%
                       27%
80%

70%

60%
                                                                    44%                                          42%
                       39%
50%

40%

30%

20%                    27%                                          27%                                          27%

10%
                       6%                                           7%                                        7%
 0%                    1%                                           1%                                        1%
           The quality of that visibility       Acquiring such visibility in a timely fashion     How comprehensive the visibility is
                                                                                                                                        31
Q218: When it comes to maintaining visibility into security across
                the entire company's infrastructure, please rate how you are doing
                                 in each of the following areas.
                                   (Somewhat/Extremely well)


       How comprehensive the visibility is                                           65%




Acquiring such visibility in a timely fashion                                         65%




                The quality of that visibility                                            66%




                                                 0%   10%   20%   30%   40%   50%   60%         70%
                                                                                                 32
Q218: When it comes to maintaining visibility into security across
                the entire company's infrastructure, please rate how you are doing
                                 in each of the following areas.
                                 (Somewhat/Extremely poorly)


       How comprehensive the visibility is                                                    8%




Acquiring such visibility in a timely fashion                                                 8%




                The quality of that visibility                                      7%




                                                 0%   1%   2%   3%   4%   5%   6%        7%    8%   9%
                                                                                                    33
Q219: When it comes to your organization's ability to correlate and
         analyze security alerts across the enterprise, please rate how you
                     are doing in each of the following areas:
       1 - Extremely poor     2 - Somewhat poor        3 - Neither poor nor well      4 - Somewhat well        5 - Extremely well
100%

90%
                                25%                                                                   27%
80%

70%

60%
                                42%                                                                   41%
50%

40%

30%

20%                             27%                                                                   26%

10%
                                 5%                                                                    5%
 0%                              1%                                                                    1%
              The timeliness of correlation and analysis                           The quality of the correlation and analysis
                                                                                                                                    34
Q219: When it comes to your organization's ability to correlate and
               analyze security alerts across the enterprise, please rate how you
                           are doing in each of the following areas.
                                  (Somewhat/Extremely well)



The quality of the correlation and analysis                                             68%




The timeliness of correlation and analysis                                             67%




                                              0%   10%   20%   30%   40%   50%   60%          70%   80%
                                                                                                     35
Q219: When it comes to your organization's ability to correlate and
               analyze security alerts across the enterprise, please rate how you
                           are doing in each of the following areas.
                                 (Somewhat/Extremely poorly)



The quality of the correlation and analysis                                    6%




The timeliness of correlation and analysis                                           7%




                                              0%   1%   2%   3%   4%    5%      6%        7%
                                                                                          36
Q220: When it comes to your organization's ability to respond to
            security events, please rate how you are doing in each of the
                                   following areas:
       1 - Extremely poor      2 - Somewhat poor          3 - Neither poor nor well   4 - Somewhat well      5 - Extremely well
100%

90%
                                 25%                                                                28%
80%

70%

60%
                                 45%                                                                42%
50%

40%

30%

20%                              24%                                                                25%
10%
                                  5%                                                                 5%
 0%                               1%                                                                 1%
                 Ability to respond in a timely fashion                               The effectiveness of your response
                                                                                                                                  37
Q220: When it comes to your organization's ability to respond to
                   security events, please rate how you are doing in each of the
                                          following areas.
                                    (Somewhat/Extremely well)



The effectiveness of your response                                                69%




Ability to respond in a timely fashion                                            70%




                                         0%   10%   20%   30%   40%   50%   60%         70%   80%
                                                                                               38
Q220: When it comes to your organization's ability to respond to
                   security events, please rate how you are doing in each of the
                                          following areas.
                                   (Somewhat/Extremely poorly)



The effectiveness of your response                                            6%




Ability to respond in a timely fashion                                                  7%




                                         0%   1%   2%   3%     4%       5%         6%        7%
                                                                                             39
Security Staffing


                    40
Q221: How would you characterize your security staffing levels at
                                    the current time?

    We are extremely overstaffed          4%




    We are somewhat overstaffed                     11%




We have just enough security staff                                                       41%




   We are somewhat understaffed                                              32%




   We are extremely understaffed                    11%


                                     0%        5%   10%   15%   20%   25%   30%    35%    40%   45%
                                                                                                 41
Q222: Overall, how would you rate the effectiveness of your IT
                                        security staff?

                         Completely effective              10%




                              Mostly effective                                                               42%




Not as good as we would like, but not horrible                                       24%




                        Somewhat ineffective                           15%




                       Completely ineffective              10%


                                                 0%   5%         10%         15%   20%     25%   30%   35%   40%   45%
                                                                                                                    42
Q223: What is keeping you from rating your security staffing as
         "completely effective?" Rank the following areas of cyber security
                 staffing in terms of difficulty for your organization.
100%
                                                                                 6%
                                   17%           16%            14%
90%                   19%                                                       10%
         29%
80%                                                             14%
                                   18%           18%                            20%
70%                   23%
         17%                                                    16%                        1
60%                                              13%
                                   18%                                          16%        2
50%                   15%                                       14%                        3
         18%                                     16%                                       4
40%                                                                             19%
                                   21%                                                     5
                      18%                                       15%
30%                                                                                        6
         15%
                                                 22%
20%
                      17%          15%
         12%                                                    27%             29%
10%
                                                 15%
         10%           9%          11%
 0%
       Recruiting   Retention    Skill sets   Experience   Staff retirement   Awareness
                                                                                          43
Q223: What is keeping you from rating your security staffing as
          "completely effective?" Rank the following areas of cyber security
                 staffing in terms of difficulty for your organization.
                                   (Average Ranks)
    Recruiting      Retention     Skill sets   Experience   Staff retirement   Awareness
0


1


2

       2.93
                       3.18
3                                    3.29
                                                  3.56
                                                                  3.85
4                                                                                4.19



5


6
                                                                                           44
Managed Security Service Providers


                                     45
Q224: What managed security service provider vendors are you
                        considering using or do you currently use?
                                   (Mark all that apply.)

                          Other (Please specify)        5%


                                BT/Counterpane                      16%


We don't use a managed security service provider                     17%


                               Verizon Business                                  24%


                              Dell/SecureWorks                                               29%


                                          AT&T                                                30%


                                        IBM/ISS                                                            39%


                                      Symantec                                                                 40%

                                                   0%    5%   10%   15%    20%         25%         30%   35%     40%   45%
                                                                                                                        46
Q225: How much influence does your managed security service
                    provider have over which security products your company
                                          purchases?

   Complete influence                        13%




 A moderate influence                                                        35%




                Neutral                                          28%




    Very little influence                    14%




Absolutely no influence               10%


                            0%   5%    10%         15%   20%   25%     30%     35%   40%
                                                                                      47
SIEM


       48
Q226: What Security Information and Event Management (SIEM)
                               vendors do you currently use?
                                     (Mark all that apply.)

Other (Please specify)        1%



             Q1 Labs                     16%



 We don't use a SIEM                           19%



 EMC/RSA (enVision)                                  22%



         HP/ArcSight                                         34%



            Symantec                                                           55%


                         0%        10%               20%   30%     40%   50%         60%
                                                                                      49
Q227: How do the following challenges impact your ability to realize
               the full value of your Security Information and Event Management
                                         (SIEM) solution?
             1 - Extreme impact            2 - Moderate impact            3 - Some impact             4 - Slight impact            5 - No impact whatsoever
100%
              9%                  10%                  12%                 11%                  12%                  11%                  14%               14%
90%

80%                               25%
              27%                                      23%                 24%                  26%                  26%                                    22%
                                                                                                                                          24%
70%

60%

50%           28%                 30%                  30%                 31%                  28%                  29%                  29%               31%
40%

30%
              17%
                                  23%                  23%                 22%                  20%                  19%                  21%               22%
20%

10%           19%
                                  13%                  13%                 12%                  14%                  15%                  12%               11%
 0%
       Insufficient staff to        Trouble        Staff doesn't have      Trouble        Insufficient staff to     Trouble             Insufficient     Insufficient
              set up          integrating latest      enough time     maintaining SIEM         maintain          responding to      training to set up    training to
                                information on                             rules to                               incidents in                             maintain
                                 new threats,                         correlate/analyze                         timely/effective
                             vulnerabilities, etc.                    alerts in real time                           manner
                                                                                                                                                                        50
Q227: How do the following challenges impact your ability to realize
                the full value of your Security Information and Event Management
                                          (SIEM) solution?
                                     (Moderate/Extreme impact)
                                            Insufficient training to maintain                                     33%

                                              Insufficient training to set up                                      34%

               Trouble responding to incidents in timely/effective manner                                           34%

                                               Insufficient staff to maintain                                       34%

   Trouble maintaining SIEM rules to correlate/analyze alerts in real time                                          34%

                                           Staff doesn't have enough time                                               35%

Trouble integrating latest information on new threats, vulnerabilities, etc.                                            36%

                                                 Insufficient staff to set up                                            36%

                                                                                0%   5%   10%   15%   20%   25%   30%     35%   40%
                                                                                                                                 51
Q227: How do the following challenges impact your ability to realize
                the full value of your Security Information and Event Management
                                          (SIEM) solution?
                                         (Slight/No impact)
                                            Insufficient training to maintain                                            36%

                                              Insufficient training to set up                                             38%

               Trouble responding to incidents in timely/effective manner                                                 37%

                                               Insufficient staff to maintain                                                 38%

   Trouble maintaining SIEM rules to correlate/analyze alerts in real time                                              35%

                                           Staff doesn't have enough time                                               35%

Trouble integrating latest information on new threats, vulnerabilities, etc.                                        35%

                                                 Insufficient staff to set up                                            36%

                                                                                0%   5%   10%   15%   20%   25%   30%     35%       40%   45%
                                                                                                                                           52

More Related Content

Viewers also liked

RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
Symantec
 
2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report
Symantec
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
Symantec
 
Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014
Symantec
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
Symantec
 
числа фибоначчи
числа фибоначчичисла фибоначчи
числа фибоначчиKristina Goychu
 
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.) И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
Irina Wickholm
 
Backstopper 3-D Dodgeball
Backstopper 3-D DodgeballBackstopper 3-D Dodgeball
Backstopper 3-D Dodgeball
MO LE Funeral Assistance Team
 
Deploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGIDeploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGI
정주 김
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
Symantec
 
Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
Jordi Soucheiron
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Symantec LATAM
 
Mi dossier fotográfico
Mi dossier fotográficoMi dossier fotográfico
Mi dossier fotográfico
FabreFlames
 

Viewers also liked (14)

RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
 
Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
testing.pptx
testing.pptxtesting.pptx
testing.pptx
 
числа фибоначчи
числа фибоначчичисла фибоначчи
числа фибоначчи
 
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.) И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
 
Backstopper 3-D Dodgeball
Backstopper 3-D DodgeballBackstopper 3-D Dodgeball
Backstopper 3-D Dodgeball
 
Deploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGIDeploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGI
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
 
Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
 
Mi dossier fotográfico
Mi dossier fotográficoMi dossier fotográfico
Mi dossier fotográfico
 

Similar to Symantec 2011 Threat Management Survey Global Results

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
Lumension
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPs
CA Nimsoft
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
Accenture
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights
Travis Burge
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012
Edelman
 
Get To Know Your Ba
Get To Know Your BaGet To Know Your Ba
Get To Know Your Ba
Johny Bravo
 
2012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 20122012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 2012
Symantec
 
Iavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BAIavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BA
Codecamp Romania
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report
Connell & Partners
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™
Jen Landsberg
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
Symantec
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011
Derek E. Weeks
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
Vladimir Matviychuk
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
Jon Gatrell
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Центр корпоративной мобильности АйТи
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM survey
The Reference
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social media
Josh Feldberg
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Lumension
 
How Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility TrendsHow Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility Trends
Steelwedge
 

Similar to Symantec 2011 Threat Management Survey Global Results (20)

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and Budget
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPs
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012
 
Get To Know Your Ba
Get To Know Your BaGet To Know Your Ba
Get To Know Your Ba
 
2012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 20122012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 2012
 
Iavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BAIavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BA
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM survey
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social media
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
How Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility TrendsHow Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility Trends
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Symantec 2011 Threat Management Survey Global Results

  • 1. 2011 Threat Management Survey Global Data
  • 2. Methodology • Survey performed by Applied Research • 1,025 global enterprises • Tactical IT, Strategic IT and C-level professionals • Cross-industry 2
  • 3. Key Findings • Enterprises not confident in their security posture • Organizations struggling with timely analysis and response • Top concerns are security intelligence and visibility • Staffing problems top list of issues impacting ability to respond to new and emerging threats 3
  • 4. Security Confidence • 57% lack confidence in IT security staffs’ ability to respond to new threats • Why? Several of the factors tied to staffing – Not enough staff – Staff lacks time 4
  • 5. Staffing Issues • 66% rate staff as less than effective • Only 4% rate staff as completely effective • Why? – Recruiting – Retention – Right skill sets
  • 6. Top Security Concerns • Intelligence • Visibility • Analysis 6
  • 7. Security Shortcomings • Timely and quality alert correlation/analysis • Timely and effective event response 7
  • 8. Symantec Recommendations • Build a comprehensive incident management program • Be vigilant about the changing threat landscape • Broaden the visibility across your infrastructure • Evaluate systems for managing security information and alerts
  • 11. Q2: How many employees does your organization have in all locations worldwide? 1,000 to 2,499 33% 2,500 to 4,999 33% 5,000 or more 34% 0% 5% 10% 15% 20% 25% 30% 35% 40% 11
  • 12. Q3: What is your organization's primary industry? Advertisement 1% Media 2% Living-related and personal services and amusement services 2% Legal 2% Energy 2% Transport and freight service (cover such as Airline/railway industry) 3% Internet 3% Eating and drinking services, accommodations 3% Real estate and goods rental and leasing 4% Government 4% Education, Learning and Support 4% Construction 5% Medical, Health Care and Welfare 6% Manufacturing 9% Other 10% Wholesale and Retail 10% Scientific research, professional and technical services 10% Information Technology and Communications 10% Finance and Insurance 10% 0% 2% 4% 6% 8% 10% 12% 12
  • 13. Q4: What is your primary role? Manage our computing resources 25% Management role in IT, primarily focused on tactical/operational 25% issues Management role in IT, primarily focused on strategic issues 25% C-level or business owner 25% 0% 5% 10% 15% 20% 25% 30% 13
  • 14. Q5: What is your title? President 2% Owner 3% Partner 1% CIO 25% CTO 5% CISO 1% Vice President or Senior Vice President in a computing area 4% Director in a computing area 9% Manager of Information Systems or Computer Systems 22% Systems analyst 12% Systems architect 3% Systems designer 3% Other 11% 0% 5% 10% 15% 20% 25% 30% 14
  • 15. What is your age? 50 or older (Boomer) 10% 30 or less (Millennial) 22% 31 to 49 (Gen-X) 68% 15
  • 16. Q7: What is your gender? Female 19% Male 81% 16
  • 17. Q8: How many years have you been working in computer systems and technology? 14 12.88 12 12 10 8 6 4 2 0 Mean Median 17
  • 18. Q9: What are your company's annual revenues? Less than $500,000 2% $500,000 to $2,000,000 3% $2,000,000 to $7,500,000 4% $7,500,000 to $30,000,000 5% $30,000,000 to $100,000,000 9% $100,000,000 to $500,000,000 15% $500,000,000 to $1,500,000,000 16% $1,500,000,000 to $5,000,000,000 16% $5,000,000,000 to $25,000,000,000 16% $25,000,000,000 to $100,000,000,000 7% More than $100,000,000,000 7% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 18
  • 19. Q10: Characterize your company's year-over-year annual growth rate in terms of annual revenue: Decline to state 3% Growing at 100% per year or more 0% Growing at 50 to 99% per year 5% Growing at 25 to 49% per year 7% Growing at between 10 to 24% per year 29% Growing at between 1 to 9% per year 31% Flat: Neither growing nor declining 11% Declining at between 1 to 9% per year 4% Declining at between 10 to 24% per year 9% Declining 25% per year or greater 1% 0% 5% 10% 15% 20% 25% 30% 35% 19
  • 21. Q213: How confident are you that your IT security staff can handle new security threats in a timely and effective manner? Very confident 19% Somewhat confident 25% Neutral 19% Somewhat concerned 18% Very concerned 20% 0% 5% 10% 15% 20% 25% 30% 21
  • 22. Q214: What are the top three factors that are keeping you from being completely confident in your ability to handle new security threats in a timely and effective manner? (Ranked 1, 2, or 3) No access to latest information about new threats, vulnerabilities, etc. 36% Security staff lacks necessary experience/skill sets 39% Trouble responding to security incidents in a timely/effective manner 43% Staff doesn't have enough time 45% Trouble correlating/analyzing security alerts as they are happening 45% Not enough visibility into security across entire infrastructure 45% Insufficient security staff 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 22
  • 24. Q215: Please review the following aspects of security and rank them in terms of what concerns you the most. 100% 90% 17% 18% 24% 80% 41% 20% 70% 28% 25% 60% 1 50% 25% 2 27% 3 40% 28% 28% 4 30% 19% 20% 38% 27% 10% 23% 13% 0% Security intelligence Security visibility Attack analysis Security response 24
  • 25. Q215: Please review the following aspects of security and rank them in terms of what concerns you the most. (Average Ranks) Security intelligence Security visibility Attack analysis Security response 0 1 2 2.04 2.50 2.64 2.82 3 4 25
  • 26. Q216: Please rank these aspects in terms of your organization's ability to execute. 100% 90% 19% 17% 26% 80% 38% 21% 70% 25% 60% 26% 1 50% 24% 2 29% 3 40% 29% 4 28% 30% 19% 20% 38% 26% 10% 21% 15% 0% Security intelligence Security visibility Attack analysis Security response 26
  • 27. Q216: Please rank these aspects in terms of your organization's ability to execute. (Average Ranks) Security intelligence Security visibility Attack analysis Security response 0 1 2.10 2 2.44 2.62 2.83 3 4 27
  • 28. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 24% 27% 80% 70% 60% 41% 40% 50% 40% 30% 25% 20% 26% 10% 7% 5% 0% 3% 1% Acquiring such intelligence in a timely fashion The quality of intelligence you gather 28
  • 29. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas. (Somewhat/Extremely well) The quality of intelligence you gather 68% Acquiring such intelligence in a timely fashion 65% 0% 10% 20% 30% 40% 50% 60% 70% 80% 29
  • 30. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas. (Somewhat/Extremely poorly) The quality of intelligence you gather 6% Acquiring such intelligence in a timely fashion 10% 0% 2% 4% 6% 8% 10% 12% 30
  • 31. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 21% 22% 27% 80% 70% 60% 44% 42% 39% 50% 40% 30% 20% 27% 27% 27% 10% 6% 7% 7% 0% 1% 1% 1% The quality of that visibility Acquiring such visibility in a timely fashion How comprehensive the visibility is 31
  • 32. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) How comprehensive the visibility is 65% Acquiring such visibility in a timely fashion 65% The quality of that visibility 66% 0% 10% 20% 30% 40% 50% 60% 70% 32
  • 33. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) How comprehensive the visibility is 8% Acquiring such visibility in a timely fashion 8% The quality of that visibility 7% 0% 1% 2% 3% 4% 5% 6% 7% 8% 9% 33
  • 34. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 25% 27% 80% 70% 60% 42% 41% 50% 40% 30% 20% 27% 26% 10% 5% 5% 0% 1% 1% The timeliness of correlation and analysis The quality of the correlation and analysis 34
  • 35. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) The quality of the correlation and analysis 68% The timeliness of correlation and analysis 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 35
  • 36. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) The quality of the correlation and analysis 6% The timeliness of correlation and analysis 7% 0% 1% 2% 3% 4% 5% 6% 7% 36
  • 37. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 25% 28% 80% 70% 60% 45% 42% 50% 40% 30% 20% 24% 25% 10% 5% 5% 0% 1% 1% Ability to respond in a timely fashion The effectiveness of your response 37
  • 38. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) The effectiveness of your response 69% Ability to respond in a timely fashion 70% 0% 10% 20% 30% 40% 50% 60% 70% 80% 38
  • 39. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) The effectiveness of your response 6% Ability to respond in a timely fashion 7% 0% 1% 2% 3% 4% 5% 6% 7% 39
  • 41. Q221: How would you characterize your security staffing levels at the current time? We are extremely overstaffed 4% We are somewhat overstaffed 11% We have just enough security staff 41% We are somewhat understaffed 32% We are extremely understaffed 11% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 41
  • 42. Q222: Overall, how would you rate the effectiveness of your IT security staff? Completely effective 10% Mostly effective 42% Not as good as we would like, but not horrible 24% Somewhat ineffective 15% Completely ineffective 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 42
  • 43. Q223: What is keeping you from rating your security staffing as "completely effective?" Rank the following areas of cyber security staffing in terms of difficulty for your organization. 100% 6% 17% 16% 14% 90% 19% 10% 29% 80% 14% 18% 18% 20% 70% 23% 17% 16% 1 60% 13% 18% 16% 2 50% 15% 14% 3 18% 16% 4 40% 19% 21% 5 18% 15% 30% 6 15% 22% 20% 17% 15% 12% 27% 29% 10% 15% 10% 9% 11% 0% Recruiting Retention Skill sets Experience Staff retirement Awareness 43
  • 44. Q223: What is keeping you from rating your security staffing as "completely effective?" Rank the following areas of cyber security staffing in terms of difficulty for your organization. (Average Ranks) Recruiting Retention Skill sets Experience Staff retirement Awareness 0 1 2 2.93 3.18 3 3.29 3.56 3.85 4 4.19 5 6 44
  • 45. Managed Security Service Providers 45
  • 46. Q224: What managed security service provider vendors are you considering using or do you currently use? (Mark all that apply.) Other (Please specify) 5% BT/Counterpane 16% We don't use a managed security service provider 17% Verizon Business 24% Dell/SecureWorks 29% AT&T 30% IBM/ISS 39% Symantec 40% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 46
  • 47. Q225: How much influence does your managed security service provider have over which security products your company purchases? Complete influence 13% A moderate influence 35% Neutral 28% Very little influence 14% Absolutely no influence 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 47
  • 48. SIEM 48
  • 49. Q226: What Security Information and Event Management (SIEM) vendors do you currently use? (Mark all that apply.) Other (Please specify) 1% Q1 Labs 16% We don't use a SIEM 19% EMC/RSA (enVision) 22% HP/ArcSight 34% Symantec 55% 0% 10% 20% 30% 40% 50% 60% 49
  • 50. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? 1 - Extreme impact 2 - Moderate impact 3 - Some impact 4 - Slight impact 5 - No impact whatsoever 100% 9% 10% 12% 11% 12% 11% 14% 14% 90% 80% 25% 27% 23% 24% 26% 26% 22% 24% 70% 60% 50% 28% 30% 30% 31% 28% 29% 29% 31% 40% 30% 17% 23% 23% 22% 20% 19% 21% 22% 20% 10% 19% 13% 13% 12% 14% 15% 12% 11% 0% Insufficient staff to Trouble Staff doesn't have Trouble Insufficient staff to Trouble Insufficient Insufficient set up integrating latest enough time maintaining SIEM maintain responding to training to set up training to information on rules to incidents in maintain new threats, correlate/analyze timely/effective vulnerabilities, etc. alerts in real time manner 50
  • 51. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? (Moderate/Extreme impact) Insufficient training to maintain 33% Insufficient training to set up 34% Trouble responding to incidents in timely/effective manner 34% Insufficient staff to maintain 34% Trouble maintaining SIEM rules to correlate/analyze alerts in real time 34% Staff doesn't have enough time 35% Trouble integrating latest information on new threats, vulnerabilities, etc. 36% Insufficient staff to set up 36% 0% 5% 10% 15% 20% 25% 30% 35% 40% 51
  • 52. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? (Slight/No impact) Insufficient training to maintain 36% Insufficient training to set up 38% Trouble responding to incidents in timely/effective manner 37% Insufficient staff to maintain 38% Trouble maintaining SIEM rules to correlate/analyze alerts in real time 35% Staff doesn't have enough time 35% Trouble integrating latest information on new threats, vulnerabilities, etc. 35% Insufficient staff to set up 36% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 52