The 2011 Threat Management Survey found that:
1) Enterprises were not confident in their security posture and many were struggling with timely analysis and response to threats. Their top concerns were security intelligence, visibility, and analysis.
2) 57% of respondents lacked confidence in their IT security staff's ability to respond to new threats due to staffing issues like not having enough staff, staff lacking time, and staff lacking the right skill sets.
3) 66% rated their staff as less than effective at security tasks, with only 4% rating their staff as completely effective due to challenges with recruiting, retention, and ensuring staff have the right skill sets.
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
A survey of ship owners, operators, and charterers found they were generally confident in their understanding of upcoming IMO regulations for Ship Energy Efficiency Management Plans (SEEMP). Most companies had SEEMP plans in place, though Asian companies were less prepared. Larger companies favor electronic SEEMP methods while smaller companies prefer paper-based plans due to lower costs. However, electronic SEEMP may provide efficiency savings that many smaller companies are unaware of. While paper-based plans are easier, electronic options may improve efficiency and support paperless systems. Increased information could help smaller owners better implement effective and cost-saving SEEMP compliance.
Symantec 2010 Critical Information Infrastructure Protection (CIP) Survey found, among other things, that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks. Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses.
Companies preparing to migrate their systems over to Windows 7 – or even just considering a migration – can benefit from learning from the IT teams who have been there and done that. Symantec conducted a survey of more than 1,300 IT managers across the globe to help to determine best, and worst, practices that will help make future Windows 7 migrations successful. For example, the survey found that a sound migration plan and an integrated, automated solution are key ingredients of a successful migration to Windows 7.
Reboot Service Management
Eveline Oehrlich, Principal Analyst, Forrester Research
There are a variety of forces which are changing – complexity of the business environment, new technologies such as cloud and self-service and the workforce. What does this mean to you in IT? What are the challenges you are facing and how can you reboot your Service Management initiatives. Eveline discusses what can you do as an individual contributor, team lead or manager to gain or improve your Service Management program.
The document discusses benchmarks from a survey of privacy programs and the costs of privacy programs. It finds that organizations with more effective information security programs spend more on privacy. The highest spending categories for privacy programs are data security and program management, while the lowest are policies/procedures and redress/enforcement.
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
A survey of ship owners, operators, and charterers found they were generally confident in their understanding of upcoming IMO regulations for Ship Energy Efficiency Management Plans (SEEMP). Most companies had SEEMP plans in place, though Asian companies were less prepared. Larger companies favor electronic SEEMP methods while smaller companies prefer paper-based plans due to lower costs. However, electronic SEEMP may provide efficiency savings that many smaller companies are unaware of. While paper-based plans are easier, electronic options may improve efficiency and support paperless systems. Increased information could help smaller owners better implement effective and cost-saving SEEMP compliance.
Symantec 2010 Critical Information Infrastructure Protection (CIP) Survey found, among other things, that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks. Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses.
Companies preparing to migrate their systems over to Windows 7 – or even just considering a migration – can benefit from learning from the IT teams who have been there and done that. Symantec conducted a survey of more than 1,300 IT managers across the globe to help to determine best, and worst, practices that will help make future Windows 7 migrations successful. For example, the survey found that a sound migration plan and an integrated, automated solution are key ingredients of a successful migration to Windows 7.
Reboot Service Management
Eveline Oehrlich, Principal Analyst, Forrester Research
There are a variety of forces which are changing – complexity of the business environment, new technologies such as cloud and self-service and the workforce. What does this mean to you in IT? What are the challenges you are facing and how can you reboot your Service Management initiatives. Eveline discusses what can you do as an individual contributor, team lead or manager to gain or improve your Service Management program.
The document discusses benchmarks from a survey of privacy programs and the costs of privacy programs. It finds that organizations with more effective information security programs spend more on privacy. The highest spending categories for privacy programs are data security and program management, while the lowest are policies/procedures and redress/enforcement.
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
The Symantec Intelligence Report for January 2012 showed that:
- The global spam rate increased to 69.0%
- The rate of phishing emails was 1 in 370
- The rate of emails containing malware was 1 in 295
- 2,102 malicious websites were blocked per day
The report provided details on the sources and categories of spam, phishing and malware threats over the past month.
The July 2011 Symantec Intelligence Report from Symantec reveals a significant increase in activity related to what may be described as a aggressive and rapidly changing form of generic polymorphic malware. With one in 280.9 emails identified as malicious in July, the rise accounted for 23.7 percent of all email-borne malware intercepted in July; more than double the same figure six months ago, indicating a much more aggressive strategy on the part of the cyber criminals responsible.
Top 10 Reasons to upgrade to BackupExec 2014Symantec
Symantec Backup Exec 2014 is a backup and recovery software solution that provides numerous advantages over previous versions. It delivers backups that are up to 100% faster than previous versions through improved data deduplication and change block tracking. It also reduces storage needs through integrated efficient data deduplication and archiving. Further, Backup Exec 2014 provides easy administration through an intuitive interface and centralized management console. It allows backups to a wide variety of storage destinations and fast, flexible recovery of virtual machines, files, applications and other data through its indexing and cataloging features.
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
Symantec's 2011 Enterprise Encryption Trends Survey found enterprises are securing data with encryption in more places than ever. However, the survey discovered that encryption solutions are fragmented, creating risk for organizations from the lack of centralized control of access to sensitive information and disrupting critical processes such as e-discovery and compliance monitoring. In fact, the inability to access important business information due to fragmented encryption solutions and poor key management is costing each organization an average of $124,965 per year.
Join the Backstoppers Blowout 3-D Dodgeball Challenge on April 7th at Sky Zone in Chesterfield, Missouri. Local police and fire teams will compete in a 6 vs 6 dodgeball tournament on Sky Zone's all-trampoline courts to benefit the St. Louis Backstoppers. The event is limited to the first 10 registered teams and costs $100 per team to participate. Proceeds will support the St. Louis Backstoppers organization.
Symantec’s 2011 Critical Infrastructure Protection (CIP) Survey found a drop in awareness and engagement as measured by the CIP Participation Index. Companies show a CIP Participation Index of 82 percent in 2011, down 18 points from 2010. Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.
Simple webapps with nginx, uwsgi emperor and bottleJordi Soucheiron
Bottle is a small microframework that lets you build simple python webapps in a few minutes. This talk will explain how to build simple webapp from scratch and configure your system to deploy many other apps concurrently with a rock solid and scalable setup.
El documento lista diferentes tipos de planos y ángulos de cámara utilizados en fotografía como gran plano general, plano general, plano de cuerpo entero, primer plano y detalle. También describe composiciones basadas en líneas verticales, horizontales, diagonales y curvas, asi como iluminación lateral, contraluz y fotografías que juegan con la profundidad de campo o tienen significado especial o son artísticas.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds
500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations were carried out during March 2013, and here is what they had to say about time and budget concerns.
The Top Reasons Enterprises Outsource IT to MSPsCA Nimsoft
Half of Executives Say They Foresee Moving Toward 100 Percent MSP Engagement
The survey, conducted in association with Enterprise Management Associates™ (EMA), collected responses, experiences and opinions from executives, mid-level managers and individual IT contributors from mid-sized and large organizations. All participants were currently engaged with an MSP, planning to engage and MSP, or had used MSP services in the past.
Visit www.nimsoft.com for more information.
Data growth-protection-trends-research-resultsAccenture
This document summarizes the results of a survey about data growth and protection trends sponsored by Symform and StorageCraft. Nearly 600 respondents representing small, medium, and large enterprises completed the survey. The top findings include that cloud utilization for backup is increasing, with nearly 40% using the cloud. Cost and restore failures are the biggest challenges. Satisfaction varies by industry and company size. Most expect significant annual data growth of 10-40% and are backing up critical data weekly, though nearly 20% still lack secondary backup.
LinkedIn Australian Demographic Insights Travis Burge
This document provides demographic insights about LinkedIn members in Australia. It shows that the top three cities for LinkedIn members are Sydney, Melbourne, and Brisbane. When looking at sectors, the industries with the most LinkedIn members are finance, high-tech, and manufacturing. The breakdown of seniority levels among Australian LinkedIn members shows most are entry-level employees or senior-level individual contributors.
The document discusses the role of a business analyst (BA). It provides an overview of what a BA is, why it's important to understand your organization's BA, demographics of the BA field, a typical day for a BA, and challenges BAs face. It also outlines best practices for BAs, such as identifying stakeholders, understanding the scope of change, considering alternatives to meet goals with minimal effort, and ensuring requirements traceability. The presentation resources include surveys from Forrester, IIBA, and others on topics like BA company size, preferred industries, team sizes, and tools used.
2012 SMB Disaster Preparedness Survey Global Results May 2012Symantec
The Symantec 2012 SMB Disaster Preparedness Survey discovered that disaster preparedness is closely connected with small- and mid-sized businesses’ (SMBs) adoption of technologies like virtualization, cloud computing, and mobility. The survey also revealed how willing SMBs are to adopt these technologies, often with improved disaster preparedness as a goal, and how the move is paying off for them.
The Symantec Intelligence Report for January 2012 showed that:
- The global spam rate increased to 69.0%
- The rate of phishing emails was 1 in 370
- The rate of emails containing malware was 1 in 295
- 2,102 malicious websites were blocked per day
The report provided details on the sources and categories of spam, phishing and malware threats over the past month.
The July 2011 Symantec Intelligence Report from Symantec reveals a significant increase in activity related to what may be described as a aggressive and rapidly changing form of generic polymorphic malware. With one in 280.9 emails identified as malicious in July, the rise accounted for 23.7 percent of all email-borne malware intercepted in July; more than double the same figure six months ago, indicating a much more aggressive strategy on the part of the cyber criminals responsible.
Top 10 Reasons to upgrade to BackupExec 2014Symantec
Symantec Backup Exec 2014 is a backup and recovery software solution that provides numerous advantages over previous versions. It delivers backups that are up to 100% faster than previous versions through improved data deduplication and change block tracking. It also reduces storage needs through integrated efficient data deduplication and archiving. Further, Backup Exec 2014 provides easy administration through an intuitive interface and centralized management console. It allows backups to a wide variety of storage destinations and fast, flexible recovery of virtual machines, files, applications and other data through its indexing and cataloging features.
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
Symantec's 2011 Enterprise Encryption Trends Survey found enterprises are securing data with encryption in more places than ever. However, the survey discovered that encryption solutions are fragmented, creating risk for organizations from the lack of centralized control of access to sensitive information and disrupting critical processes such as e-discovery and compliance monitoring. In fact, the inability to access important business information due to fragmented encryption solutions and poor key management is costing each organization an average of $124,965 per year.
Join the Backstoppers Blowout 3-D Dodgeball Challenge on April 7th at Sky Zone in Chesterfield, Missouri. Local police and fire teams will compete in a 6 vs 6 dodgeball tournament on Sky Zone's all-trampoline courts to benefit the St. Louis Backstoppers. The event is limited to the first 10 registered teams and costs $100 per team to participate. Proceeds will support the St. Louis Backstoppers organization.
Symantec’s 2011 Critical Infrastructure Protection (CIP) Survey found a drop in awareness and engagement as measured by the CIP Participation Index. Companies show a CIP Participation Index of 82 percent in 2011, down 18 points from 2010. Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.
Simple webapps with nginx, uwsgi emperor and bottleJordi Soucheiron
Bottle is a small microframework that lets you build simple python webapps in a few minutes. This talk will explain how to build simple webapp from scratch and configure your system to deploy many other apps concurrently with a rock solid and scalable setup.
El documento lista diferentes tipos de planos y ángulos de cámara utilizados en fotografía como gran plano general, plano general, plano de cuerpo entero, primer plano y detalle. También describe composiciones basadas en líneas verticales, horizontales, diagonales y curvas, asi como iluminación lateral, contraluz y fotografías que juegan con la profundidad de campo o tienen significado especial o son artísticas.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds
500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations were carried out during March 2013, and here is what they had to say about time and budget concerns.
The Top Reasons Enterprises Outsource IT to MSPsCA Nimsoft
Half of Executives Say They Foresee Moving Toward 100 Percent MSP Engagement
The survey, conducted in association with Enterprise Management Associates™ (EMA), collected responses, experiences and opinions from executives, mid-level managers and individual IT contributors from mid-sized and large organizations. All participants were currently engaged with an MSP, planning to engage and MSP, or had used MSP services in the past.
Visit www.nimsoft.com for more information.
Data growth-protection-trends-research-resultsAccenture
This document summarizes the results of a survey about data growth and protection trends sponsored by Symform and StorageCraft. Nearly 600 respondents representing small, medium, and large enterprises completed the survey. The top findings include that cloud utilization for backup is increasing, with nearly 40% using the cloud. Cost and restore failures are the biggest challenges. Satisfaction varies by industry and company size. Most expect significant annual data growth of 10-40% and are backing up critical data weekly, though nearly 20% still lack secondary backup.
LinkedIn Australian Demographic Insights Travis Burge
This document provides demographic insights about LinkedIn members in Australia. It shows that the top three cities for LinkedIn members are Sydney, Melbourne, and Brisbane. When looking at sectors, the industries with the most LinkedIn members are finance, high-tech, and manufacturing. The breakdown of seniority levels among Australian LinkedIn members shows most are entry-level employees or senior-level individual contributors.
The document discusses the role of a business analyst (BA). It provides an overview of what a BA is, why it's important to understand your organization's BA, demographics of the BA field, a typical day for a BA, and challenges BAs face. It also outlines best practices for BAs, such as identifying stakeholders, understanding the scope of change, considering alternatives to meet goals with minimal effort, and ensuring requirements traceability. The presentation resources include surveys from Forrester, IIBA, and others on topics like BA company size, preferred industries, team sizes, and tools used.
2012 SMB Disaster Preparedness Survey Global Results May 2012Symantec
The Symantec 2012 SMB Disaster Preparedness Survey discovered that disaster preparedness is closely connected with small- and mid-sized businesses’ (SMBs) adoption of technologies like virtualization, cloud computing, and mobility. The survey also revealed how willing SMBs are to adopt these technologies, often with improved disaster preparedness as a goal, and how the move is paying off for them.
The document discusses the role of the business analyst (BA). It provides statistics on BA demographics such as company size, industries, team sizes, and tools used. A typical BA's day involves activities like requirements gathering, facilitation, and modeling. Key challenges for BAs are vague requirements, unrealistic timelines, and finding time with business stakeholders. Best practices include identifying all perspectives, understanding impacts, considering alternatives, and maintaining traceability of requirements.
The document summarizes the results of a compensation survey conducted by Connell & Partners in response to continuing economic uncertainty. Over 70 companies responded. Key findings include:
- 45% of companies are taking a "wait and see" approach to compensation changes
- 71% of companies making short-term changes are adjusting short-term incentive plans
- 50% expect short-term incentives to payout below target levels
- Two-thirds expect similar merit increase budgets to last year between 2.5-3.5%
- Companies are considering various long-term changes to compensation plans to address uncertainty
The document summarizes Deloitte's 2011 Technology Fast 500 ranking of the fastest growing technology companies in North America. It provides details on the selection criteria, requirements for companies to be eligible, and how revenue growth is calculated. It also shares key facts and figures about the rankings, including industry breakdowns and geographic locations of the companies. The top 10 companies are listed with their industry, growth percentage, location, and CEO.
In its sixth annual Symantec Disaster Recovery Study, Symantec found that organizations are struggling to manage disparate virtual, physical and cloud resources due to added complexity in protecting and recovering mission critical applications and data within those environments. Not only are virtual and cloud systems often not properly protected, but the study reveals a gap in downtime expectations and reality.
The survey results document summarizes a survey of over 2100 participants on their use of SharePoint. Some key findings include:
- Most respondents were IT professionals or SharePoint analysts, with the primary roles being developer, end user, or IT pro.
- Over 80% of organizations are currently using or considering SharePoint, with the majority deploying SharePoint 2010 over 2007.
- Top uses of SharePoint include portal/communication, enterprise content management, and workflow. The most challenging issues are user adoption/training and strategy.
- Over 40% of respondents said they do not have a training program for users, and most rated user experience as only somewhat adequate and requiring in-house design improvements.
This document discusses current trends in business continuity management. It notes that effective BCM is rising in importance for corporations due to increased complexity, tighter margins for error, and higher expectations for resilience and recovery times after disruptions. Leading trends that companies are adopting to improve their ability to manage emergencies and minimize impacts include implementing an enterprise-wide BCM framework and governance model, integrating business impact analysis and risk assessments, leveraging technologies like cloud computing and virtualization, and fully understanding application interdependencies for recovery.
The report is based on the survey conducted among attendees of the 2nd annual conference “Enterprise Mobility Day” which was held on October 11th, 2012 by the Center for Enterprise Mobility of I.T.Co and the Russian Union of CIO (SoDIT)
The document discusses e-CRM adoption in Belgium based on a survey. Some key findings:
1) Adoption of e-CRM is still in an early stage, with many companies not planning to implement it. Those who have report improvements or expect benefits.
2) Top reasons for implementing e-CRM are to increase revenue through customer acquisition and reduce costs. Improving marketing productivity is also a key driver.
3) Most companies opt for on-premise CRM platforms that integrate with existing IT systems, rather than cloud-based solutions. Custom solutions are also used.
The document reports on a survey of 503 business decision-makers about their use of social media in business purchasing processes. Key findings include:
- Respondents saw the greatest increases in using search engines and supplier websites over the past year. Younger respondents reported higher increases in using social media like Facebook, blogs, and Twitter.
- Respondents perceive spending the most time on search engines and supplier websites each month. Younger respondents spent more time on social media and advertising.
- Over half saw benefits of social media like access to others' experiences, while three-fifths cited weaknesses like unreliable information. Younger respondents were more likely to see no weaknesses.
- 38% used social media in their purchase
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
What are IT pros most concerned about heading into 2013? The annual State of the Endpoint Report sponsored by Lumension and conducted by Ponemon Institute reveals APTs and mobile devices pose the biggest security threat to organizations in the coming year. Unfortunately, respondents also demonstrated a disconnect between their identified risk and planned security spend as well as a significant need for improved internal collaboration.
This presentation by Larry Ponemon of the Ponemon Institute and Paul Zimski of Lumension reveals statistics on growing insecurity, IT’s perceived areas of greatest risk for 2013 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on today’s Top 3 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
How Agile is Your Business? New Research on Agility TrendsSteelwedge
Steelwedge Agility Webinar Series
Featuring Lora Cecere, Supply Chain analyst and author of the enterprise software blog "Supply Chain Shaman" with Nari Viswanathan, Steelwedge
Companies want to be more agile in driving growth regardless of volatililty in the global business environment. But there is no clear, consistent industry standard definition of business agility. To better understand what this means and how organizations like yours are using S&OP to drive supply chain agility, Lora Cecere, Founder of Supply Chain Insights and former Supply Chain Analyst and Partner with Altimeter Group, conducted a survey of business professionals in April about the importance of agility in business planning. On May 15th, Lora will be sharing her analysis of this research during her featured webinar.
View recorded webinar to learn how others are prioritizing and enabling agility in their organizations. Get tips from Lora and Steelwedge’s VP of Product Marketing, Nari Viswanathan on how you can use S&OP to drive better resilience in your operation.
Similar to Symantec 2011 Threat Management Survey Global Results (20)
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Targeted ransomware attacks have grown significantly in recent years, targeting organizations specifically. These attacks spread to pre-selected organizations through methods like spear phishing and exploiting vulnerabilities. They encrypt files on multiple computers within an organization, demanding high ransom amounts from the few victims affected. The document discusses the growth of targeted ransomware gangs since 2017 and recommends defenses like backing up data, securing remote access points, and using PowerShell monitoring to help detect these threats.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
An online gaming company experienced a potential network breach but lacked the tools to investigate what happened. Network forensics tools are needed to quickly detect breaches, determine scope and source, and speed response times. Security analytics provides integrated network monitoring, packet capture, and threat intelligence to give full visibility into network activity and reconstruct evidence for focused incident response. It reduces uncertainty and delays compared to using fragmented, log-based tools lacking rich network data and context.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
The document discusses the benefits of network forensics and security analytics solutions. It describes how an online gaming company struggled to determine if they were breached due to lacking network visibility. It then outlines how security analytics can provide complete network visibility by passively capturing all network traffic and enriching it with threat intelligence to help speed incident detection and response. The document advocates that organizations should retain at least 30 days of network traffic data for investigations. It also describes how security analytics works and the different deployment options available. Real customer examples are then provided where advanced threat assessments uncovered security issues and helped customers strengthen their security posture.
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
The document appears to be a report on internet security threats in 2019. It discusses the rise of cryptojacking malware infecting apps on the Microsoft Store and notes that cryptojacking was patched in April 2018. It also discusses a supply chain attack on Ticketmaster that resulted in formjacking. The report examines the underground economy fueled by criminal hacking and estimates underground cybercrime profits to be over $1.5 billion for 2018 alone. It provides statistics on stolen credit card numbers and estimates criminals could earn over $2.2 million per month selling access to stolen credit cards on just 10 websites.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
The document discusses building a zero trust program on a solid platform. It emphasizes that a zero trust approach requires considering six interrelated areas: data, networks, workloads, devices, people/workforce, and analytics & automation. A platform that integrates capabilities across these areas provides improved security outcomes, reduces complexity, and simplifies automation compared to a fragmented approach. The document uses Symantec's integrated cyber defense platform as an example and demonstrates how it can operationalize zero trust strategies.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. Methodology
• Survey performed by Applied Research
• 1,025 global enterprises
• Tactical IT, Strategic IT and
C-level professionals
• Cross-industry
2
3. Key Findings
• Enterprises not confident in their security posture
• Organizations struggling with timely analysis and response
• Top concerns are security intelligence and visibility
• Staffing problems top list of issues impacting ability to respond to new and
emerging threats
3
4. Security Confidence
• 57% lack confidence in IT security staffs’ ability to respond to new threats
• Why? Several of the factors tied to staffing
– Not enough staff
– Staff lacks time
4
5. Staffing Issues
• 66% rate staff as less than effective
• Only 4% rate staff as completely effective
• Why?
– Recruiting
– Retention
– Right skill sets
8. Symantec Recommendations
• Build a comprehensive incident management program
• Be vigilant about the changing threat landscape
• Broaden the visibility across your infrastructure
• Evaluate systems for managing security information and alerts
11. Q2: How many employees does your organization have in all
locations worldwide?
1,000 to 2,499 33%
2,500 to 4,999 33%
5,000 or more 34%
0% 5% 10% 15% 20% 25% 30% 35% 40%
11
12. Q3: What is your organization's primary industry?
Advertisement 1%
Media 2%
Living-related and personal services and amusement services 2%
Legal 2%
Energy 2%
Transport and freight service (cover such as Airline/railway industry) 3%
Internet 3%
Eating and drinking services, accommodations 3%
Real estate and goods rental and leasing 4%
Government 4%
Education, Learning and Support 4%
Construction 5%
Medical, Health Care and Welfare 6%
Manufacturing 9%
Other 10%
Wholesale and Retail 10%
Scientific research, professional and technical services 10%
Information Technology and Communications 10%
Finance and Insurance 10%
0% 2% 4% 6% 8% 10% 12%
12
13. Q4: What is your primary role?
Manage our computing resources 25%
Management role in IT, primarily focused on tactical/operational
25%
issues
Management role in IT, primarily focused on strategic issues 25%
C-level or business owner 25%
0% 5% 10% 15% 20% 25% 30%
13
14. Q5: What is your title?
President 2%
Owner 3%
Partner 1%
CIO 25%
CTO 5%
CISO 1%
Vice President or Senior Vice President in a computing area 4%
Director in a computing area 9%
Manager of Information Systems or Computer Systems 22%
Systems analyst 12%
Systems architect 3%
Systems designer 3%
Other 11%
0% 5% 10% 15% 20% 25% 30%
14
15. What is your age?
50 or older (Boomer)
10% 30 or less (Millennial)
22%
31 to 49 (Gen-X)
68%
15
16. Q7: What is your gender?
Female
19%
Male
81%
16
17. Q8: How many years have you been working in computer systems
and technology?
14
12.88
12
12
10
8
6
4
2
0
Mean Median
17
18. Q9: What are your company's annual revenues?
Less than $500,000 2%
$500,000 to $2,000,000 3%
$2,000,000 to $7,500,000 4%
$7,500,000 to $30,000,000 5%
$30,000,000 to $100,000,000 9%
$100,000,000 to $500,000,000 15%
$500,000,000 to $1,500,000,000 16%
$1,500,000,000 to $5,000,000,000 16%
$5,000,000,000 to $25,000,000,000 16%
$25,000,000,000 to $100,000,000,000 7%
More than $100,000,000,000 7%
0% 2% 4% 6% 8% 10% 12% 14% 16% 18%
18
19. Q10: Characterize your company's year-over-year annual growth
rate in terms of annual revenue:
Decline to state 3%
Growing at 100% per year or more 0%
Growing at 50 to 99% per year 5%
Growing at 25 to 49% per year 7%
Growing at between 10 to 24% per year 29%
Growing at between 1 to 9% per year 31%
Flat: Neither growing nor declining 11%
Declining at between 1 to 9% per year 4%
Declining at between 10 to 24% per year 9%
Declining 25% per year or greater 1%
0% 5% 10% 15% 20% 25% 30% 35%
19
21. Q213: How confident are you that your IT security staff can handle
new security threats in a timely and effective manner?
Very confident 19%
Somewhat confident 25%
Neutral 19%
Somewhat concerned 18%
Very concerned 20%
0% 5% 10% 15% 20% 25% 30%
21
22. Q214: What are the top three factors that are keeping you from
being completely confident in your ability to handle new security
threats in a timely and effective manner?
(Ranked 1, 2, or 3)
No access to latest information about new threats, vulnerabilities, etc. 36%
Security staff lacks necessary experience/skill sets 39%
Trouble responding to security incidents in a timely/effective manner 43%
Staff doesn't have enough time 45%
Trouble correlating/analyzing security alerts as they are happening 45%
Not enough visibility into security across entire infrastructure 45%
Insufficient security staff 46%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
22
24. Q215: Please review the following aspects of security and rank
them in terms of what concerns you the most.
100%
90% 17% 18%
24%
80% 41%
20%
70% 28%
25%
60%
1
50% 25% 2
27% 3
40% 28%
28% 4
30%
19%
20% 38%
27%
10% 23%
13%
0%
Security intelligence Security visibility Attack analysis Security response
24
25. Q215: Please review the following aspects of security and rank
them in terms of what concerns you the most.
(Average Ranks)
Security intelligence Security visibility Attack analysis Security response
0
1
2 2.04
2.50
2.64
2.82
3
4
25
27. Q216: Please rank these aspects in terms of your organization's
ability to execute.
(Average Ranks)
Security intelligence Security visibility Attack analysis Security response
0
1
2.10
2
2.44
2.62
2.83
3
4
27
28. Q217: When it comes to keeping up with the latest cyber-security
vulnerabilities and threats, please rate how you are doing in the
following areas:
1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well
100%
90%
24% 27%
80%
70%
60%
41%
40%
50%
40%
30%
25%
20% 26%
10%
7%
5%
0% 3% 1%
Acquiring such intelligence in a timely fashion The quality of intelligence you gather
28
29. Q217: When it comes to keeping up with the latest cyber-security
vulnerabilities and threats, please rate how you are doing in the
following areas.
(Somewhat/Extremely well)
The quality of intelligence you gather 68%
Acquiring such intelligence in a timely fashion 65%
0% 10% 20% 30% 40% 50% 60% 70% 80%
29
30. Q217: When it comes to keeping up with the latest cyber-security
vulnerabilities and threats, please rate how you are doing in the
following areas.
(Somewhat/Extremely poorly)
The quality of intelligence you gather 6%
Acquiring such intelligence in a timely fashion 10%
0% 2% 4% 6% 8% 10% 12%
30
31. Q218: When it comes to maintaining visibility into security across
the entire company's infrastructure, please rate how you are doing
in each of the following areas:
1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well
100%
90% 21% 22%
27%
80%
70%
60%
44% 42%
39%
50%
40%
30%
20% 27% 27% 27%
10%
6% 7% 7%
0% 1% 1% 1%
The quality of that visibility Acquiring such visibility in a timely fashion How comprehensive the visibility is
31
32. Q218: When it comes to maintaining visibility into security across
the entire company's infrastructure, please rate how you are doing
in each of the following areas.
(Somewhat/Extremely well)
How comprehensive the visibility is 65%
Acquiring such visibility in a timely fashion 65%
The quality of that visibility 66%
0% 10% 20% 30% 40% 50% 60% 70%
32
33. Q218: When it comes to maintaining visibility into security across
the entire company's infrastructure, please rate how you are doing
in each of the following areas.
(Somewhat/Extremely poorly)
How comprehensive the visibility is 8%
Acquiring such visibility in a timely fashion 8%
The quality of that visibility 7%
0% 1% 2% 3% 4% 5% 6% 7% 8% 9%
33
34. Q219: When it comes to your organization's ability to correlate and
analyze security alerts across the enterprise, please rate how you
are doing in each of the following areas:
1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well
100%
90%
25% 27%
80%
70%
60%
42% 41%
50%
40%
30%
20% 27% 26%
10%
5% 5%
0% 1% 1%
The timeliness of correlation and analysis The quality of the correlation and analysis
34
35. Q219: When it comes to your organization's ability to correlate and
analyze security alerts across the enterprise, please rate how you
are doing in each of the following areas.
(Somewhat/Extremely well)
The quality of the correlation and analysis 68%
The timeliness of correlation and analysis 67%
0% 10% 20% 30% 40% 50% 60% 70% 80%
35
36. Q219: When it comes to your organization's ability to correlate and
analyze security alerts across the enterprise, please rate how you
are doing in each of the following areas.
(Somewhat/Extremely poorly)
The quality of the correlation and analysis 6%
The timeliness of correlation and analysis 7%
0% 1% 2% 3% 4% 5% 6% 7%
36
37. Q220: When it comes to your organization's ability to respond to
security events, please rate how you are doing in each of the
following areas:
1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well
100%
90%
25% 28%
80%
70%
60%
45% 42%
50%
40%
30%
20% 24% 25%
10%
5% 5%
0% 1% 1%
Ability to respond in a timely fashion The effectiveness of your response
37
38. Q220: When it comes to your organization's ability to respond to
security events, please rate how you are doing in each of the
following areas.
(Somewhat/Extremely well)
The effectiveness of your response 69%
Ability to respond in a timely fashion 70%
0% 10% 20% 30% 40% 50% 60% 70% 80%
38
39. Q220: When it comes to your organization's ability to respond to
security events, please rate how you are doing in each of the
following areas.
(Somewhat/Extremely poorly)
The effectiveness of your response 6%
Ability to respond in a timely fashion 7%
0% 1% 2% 3% 4% 5% 6% 7%
39
41. Q221: How would you characterize your security staffing levels at
the current time?
We are extremely overstaffed 4%
We are somewhat overstaffed 11%
We have just enough security staff 41%
We are somewhat understaffed 32%
We are extremely understaffed 11%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
41
42. Q222: Overall, how would you rate the effectiveness of your IT
security staff?
Completely effective 10%
Mostly effective 42%
Not as good as we would like, but not horrible 24%
Somewhat ineffective 15%
Completely ineffective 10%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
42
43. Q223: What is keeping you from rating your security staffing as
"completely effective?" Rank the following areas of cyber security
staffing in terms of difficulty for your organization.
100%
6%
17% 16% 14%
90% 19% 10%
29%
80% 14%
18% 18% 20%
70% 23%
17% 16% 1
60% 13%
18% 16% 2
50% 15% 14% 3
18% 16% 4
40% 19%
21% 5
18% 15%
30% 6
15%
22%
20%
17% 15%
12% 27% 29%
10%
15%
10% 9% 11%
0%
Recruiting Retention Skill sets Experience Staff retirement Awareness
43
44. Q223: What is keeping you from rating your security staffing as
"completely effective?" Rank the following areas of cyber security
staffing in terms of difficulty for your organization.
(Average Ranks)
Recruiting Retention Skill sets Experience Staff retirement Awareness
0
1
2
2.93
3.18
3 3.29
3.56
3.85
4 4.19
5
6
44
46. Q224: What managed security service provider vendors are you
considering using or do you currently use?
(Mark all that apply.)
Other (Please specify) 5%
BT/Counterpane 16%
We don't use a managed security service provider 17%
Verizon Business 24%
Dell/SecureWorks 29%
AT&T 30%
IBM/ISS 39%
Symantec 40%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
46
47. Q225: How much influence does your managed security service
provider have over which security products your company
purchases?
Complete influence 13%
A moderate influence 35%
Neutral 28%
Very little influence 14%
Absolutely no influence 10%
0% 5% 10% 15% 20% 25% 30% 35% 40%
47
49. Q226: What Security Information and Event Management (SIEM)
vendors do you currently use?
(Mark all that apply.)
Other (Please specify) 1%
Q1 Labs 16%
We don't use a SIEM 19%
EMC/RSA (enVision) 22%
HP/ArcSight 34%
Symantec 55%
0% 10% 20% 30% 40% 50% 60%
49
50. Q227: How do the following challenges impact your ability to realize
the full value of your Security Information and Event Management
(SIEM) solution?
1 - Extreme impact 2 - Moderate impact 3 - Some impact 4 - Slight impact 5 - No impact whatsoever
100%
9% 10% 12% 11% 12% 11% 14% 14%
90%
80% 25%
27% 23% 24% 26% 26% 22%
24%
70%
60%
50% 28% 30% 30% 31% 28% 29% 29% 31%
40%
30%
17%
23% 23% 22% 20% 19% 21% 22%
20%
10% 19%
13% 13% 12% 14% 15% 12% 11%
0%
Insufficient staff to Trouble Staff doesn't have Trouble Insufficient staff to Trouble Insufficient Insufficient
set up integrating latest enough time maintaining SIEM maintain responding to training to set up training to
information on rules to incidents in maintain
new threats, correlate/analyze timely/effective
vulnerabilities, etc. alerts in real time manner
50
51. Q227: How do the following challenges impact your ability to realize
the full value of your Security Information and Event Management
(SIEM) solution?
(Moderate/Extreme impact)
Insufficient training to maintain 33%
Insufficient training to set up 34%
Trouble responding to incidents in timely/effective manner 34%
Insufficient staff to maintain 34%
Trouble maintaining SIEM rules to correlate/analyze alerts in real time 34%
Staff doesn't have enough time 35%
Trouble integrating latest information on new threats, vulnerabilities, etc. 36%
Insufficient staff to set up 36%
0% 5% 10% 15% 20% 25% 30% 35% 40%
51
52. Q227: How do the following challenges impact your ability to realize
the full value of your Security Information and Event Management
(SIEM) solution?
(Slight/No impact)
Insufficient training to maintain 36%
Insufficient training to set up 38%
Trouble responding to incidents in timely/effective manner 37%
Insufficient staff to maintain 38%
Trouble maintaining SIEM rules to correlate/analyze alerts in real time 35%
Staff doesn't have enough time 35%
Trouble integrating latest information on new threats, vulnerabilities, etc. 35%
Insufficient staff to set up 36%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
52