SlideShare a Scribd company logo
The Shifting State of Endpoint Risk:  Key Strategies to Implement in 2011
Today’s Agenda 2011 Trends in the Threat Landscape State of Endpoint Risk 2011: Survey Results Summary and Recommendations Q&A
Today’s Panelists Dr. Larry Ponemon Founder Ponemon Institute Paul Henry Security & Forensics Analyst MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE
2011 Threat Trends State-sponsored cyber crime will become a regular occurrence Social media goes deeper – increasing threats Security will finally arrive for virtualization Wikileaks will not go away Mobile devices will come under greater attack VoIP will be used as a covert channel in data breaches Medicare fraud via ID theft will see explosive growth View Paul’s entire blog at:  http://blog.lumension.com/?p=3507
State of Endpoint Risk 2011 Survey Results
Ponemon Institute  LLC The Institute is dedicated to advancing responsible information management practices that positively affect privacy and data protection in business and government. The Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations. Ponemon Institute is a full member of  CASRO  (Council of American Survey Research Organizations.  Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board.  The Institute has assembled more than 50 leading multinational corporations called the  RIM Council , which focuses the development and execution of ethical principles for the collection and use of personal data about people and households.
Project Summary The purpose of this study is to determine how effective organizations are in the protection of their endpoints and what they perceive are the biggest obstacles to reducing risk. Our study involves 564 respondents located in the United States who are deeply involved in their organization’s IT function.  51 percent are managers or hold higher positions in their organizations.  50 percent report directly to the chief information officer (CIO). 21 percent report to the chief information security officer (CISO).  28 percent work in IT security. 22 percent are in IT operations. 21 percent are in IT management.  Survey response Freq. Pct% Total sampling frame 11,896 100.0% Bounce-backs 1,875 15.8% Total survey responses 782 6.6% Rejected surveys 65 0.5% Final sample 717 6.0% Final sample after screening 564 4.7%
Industry distribution of the 564 respondents
Attributions About Endpoint Security Agree = strongly agree and agree combined.  Disagree = unsure, disagree and strongly disagree combined.
Is your IT network more secure now than it was a year ago? The study finds that the majority of respondents believe their organizations’ endpoints are vulnerable to attacks. 64 percent of respondents say their organizations’ IT networks  are not more secure  than last year percent or are unsure (36 percent + 28 percent).
Which of the following incidents happened during the past year?  Organizations face a variety of incidents that threaten the security of the endpoint. During the past year, 98 percent have had virus or malware network intrusions, 95 percent have had desktops and laptops or other devices stolen. Eighty-nine percent have lost sensitive data because of a negligent insider and 61 percent lost sensitive data because of a malicious insider.
Which incidents are you seeing frequently in your IT network?  The most frequently encountered IT network incidents are general malware attacks (92 percent of respondents), web-borne malware attacks (75 percent of respondents), botnet attacks (64 percent of respondents) and SQL injections (38 percent of respondents).
Have your malware incidents increased over the past year?  43 percent of respondents say there has been a major increase in malware attacks and 22 percent say there has been a slight increase over the past year.  Only 9 percent of respondents believe malware attacks have decreased over the past year.
How many malware incidents does your org deal with monthly?  35 percent of respondents say they have had more than 50 malware attempt incidents each month. Another 27 percent believe their organizations encounter between 25 to 50 malware attacks each month.  On average, that means that there can be one or more malware attacks per day.
Where is the greatest rise of potential IT risk? (Top 3 choices) Only 11 percent say the network infrastructure environment (gateway to endpoint) and vulnerabilities within their operating systems are driving greater potential IT risks. 10 percent say removable devices such as USB sticks and/or media such as CDs and data centers are contributing to IT risks.
Which one incident represents your biggest headache? The top three incidents that present the most difficult challenges for respondents are zero day attacks (35 percent), SQL injections (23 percent) and the exploit of existing software vulnerabilities greater than three months old (16 percent).
  Which are the greatest IT security risks next year? (Top 3 concerns) The below chart lists in descending order what respondents perceive as the seven most serious security risks their organizations will face in the near future. Respondents predict the top three IT security risks in the next 12 months will be:
Which endpoint technologies does your org use? Nearly everyone (98 percent) has anti-virus and anti-malware technologies in place followed by endpoint firewalls (60 percent) and intrusion detection systems
Which endpoint technologies are most effective? Respondents reveal what we refer to as the gap between the technologies used and the technologies considered most effective.
Is your IT organization’s operating cost increasing?
What are the main cost drivers to increasing IT OPEX? The two main cost drivers are lost employee productivity (64 percent) and IT staff bandwidth consumption (40 percent).  With respect to bandwidth, this has become a critical issue as IT and end-users access Internet sites that provide rich content such as videos.
Does your org have application installation and usage policies?  They are, however, leaving their endpoints vulnerable by allowing the indiscriminate use of applications or not enforcing policies governing the appropriate use of applications. As shown below, 38 percent of respondents have policies regarding application installation and usage but do not enforce them and one-third of organizations allow any applications to be used.
Endpoint apps - what are the greatest challenges? (Top 3 choices) The top 3 challenges with respect to their endpoint applications are: preventing applications from being installed or executing on their endpoints (55 percent), discovering what applications are residing on the network (47 percent) and ensuring that vulnerable applications are patched (42 percent).
What application management capabilities does your org have?  Respondents say they have the following capabilities in place or plan to implement in the next 12 months:
Which Web 2.0 challenges are of greatest concern?  The concern respondents have about negligent and malicious insiders is reflected in their response to how Web 2.0/social media will affect their information risk environment. The top Web 2.0/social media challenges facing respondents’ organizations are: ability for IT to identify applications in use across the IT network (59 percent), ability to manage the risk of inadvertent exposure of data (51 percent) and increasing malware (48 percent).
Are any of these applications forbidden by policy or blocked?  When it comes to IT security, which applications concern you the most in terms of increasing vulnerabilities and IT risk?  Web applications Pct% Mozilla Firefox 2% Apple apps 8% VMware 14% Apple/Mac OS 15% WinZip 19% Oracle applications 39% Microsoft OS/applications 44% Google Docs 46% Adobe 54% 3rd party applications outside of Microsoft 58%
Do you have a dedicated team for patch/vulnerability management? Twenty-six percent have not changed their priorities regarding patch/vulnerability management. Fifty-two percent say they do not have a dedicated team for patch/vulnerability management. One-third of respondents say they do have a dedicated team and 15 percent are planning to create one.
Summary of Findings Current approaches to endpoint security are ineffective and costly. Organizations do not feel more secure than they did last year.  This is mainly due to the use of ineffective technology solutions when better, more effective/efficient technologies exist but are not heavily implemented. IT operating expenses are increasing and a main driver of those costs is tied directly to an increase in malware incidents.  59 percent of respondents consider malware a significant factor in those cost drivers. Malware is on the rise with attack vectors focused more on third-party and web-based applications.
Q&A
Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 [email_address]

More Related Content

PPTX
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
 
PPTX
State of endpoint risk v3
Lumension
 
PDF
Ponemon Institute Data Breaches and Sensitive Data Risk
Fiona Lew
 
PDF
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 
PDF
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
 
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
PDF
The State of IT Security for 2019
Precisely
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
 
State of endpoint risk v3
Lumension
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Fiona Lew
 
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
The State of IT Security for 2019
Precisely
 

What's hot (16)

PPT
Organizational Security: When People are Involved
Social Media Performance Group
 
PPTX
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
PDF
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
PDF
2013-ISC2-Global-Information-Security-Workforce-Study
Tam Nguyen
 
PDF
Prof m01-2013 global information security workforce study - final
SelectedPresentations
 
PDF
Best practices for_implementing_security_awareness_training
wardell henley
 
PDF
Mimecast Threat Report
Chris Hewitt
 
PDF
EndpointSecurityConcerns2014
Peggy Lawless
 
PDF
Sharing the blame: How companies are collaborating on data security breaches
The Economist Media Businesses
 
PPT
Paul Henry’s 2011 Malware Trends
Lumension
 
PDF
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Melissa Luongo
 
PDF
2010 GISS EY
Vladimir Matviychuk
 
PDF
Prevent & Protect
Mike McMillan
 
PDF
Software piracy in Bangladesh
East West University
 
PPTX
CompTIA 11th Annual Information Security Trends
CompTIA
 
Organizational Security: When People are Involved
Social Media Performance Group
 
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
2013-ISC2-Global-Information-Security-Workforce-Study
Tam Nguyen
 
Prof m01-2013 global information security workforce study - final
SelectedPresentations
 
Best practices for_implementing_security_awareness_training
wardell henley
 
Mimecast Threat Report
Chris Hewitt
 
EndpointSecurityConcerns2014
Peggy Lawless
 
Sharing the blame: How companies are collaborating on data security breaches
The Economist Media Businesses
 
Paul Henry’s 2011 Malware Trends
Lumension
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Melissa Luongo
 
2010 GISS EY
Vladimir Matviychuk
 
Prevent & Protect
Mike McMillan
 
Software piracy in Bangladesh
East West University
 
CompTIA 11th Annual Information Security Trends
CompTIA
 
Ad

Similar to State of endpoint risk v3 (20)

PPTX
State of endpoint risk v3
Lumension
 
PPTX
Evolving State of the Endpoint Webinar
Lumension
 
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
PDF
Cybrary's navigating a security wasteland
Devendra kashyap
 
PDF
Assessing and Managing IT Security Risks
Chris Ross
 
PPTX
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
PPTX
It's Time to Rethink Your Endpoint Strategy
Lumension
 
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
PDF
2010 State Of Enterprise Security
Symantec
 
PDF
REAL TIME ENDPOINT INSIGHTS
Accelerite
 
PPTX
2013 Data Protection Maturity Trends: How Do You Compare?
Lumension
 
PDF
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Hewlett Packard Enterprise Business Value Exchange
 
PPTX
SAM05_Barber PW (7-9-15)
Norm Barber
 
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
PPTX
IT Security Essentials
Skoda Minotti
 
PDF
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
PDF
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
PPTX
Top Application Security Trends of 2012
DaveEdwards12
 
State of endpoint risk v3
Lumension
 
Evolving State of the Endpoint Webinar
Lumension
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Cybrary's navigating a security wasteland
Devendra kashyap
 
Assessing and Managing IT Security Risks
Chris Ross
 
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
It's Time to Rethink Your Endpoint Strategy
Lumension
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
2010 State Of Enterprise Security
Symantec
 
REAL TIME ENDPOINT INSIGHTS
Accelerite
 
2013 Data Protection Maturity Trends: How Do You Compare?
Lumension
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Hewlett Packard Enterprise Business Value Exchange
 
SAM05_Barber PW (7-9-15)
Norm Barber
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
IT Security Essentials
Skoda Minotti
 
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Top Application Security Trends of 2012
DaveEdwards12
 
Ad

More from Lumension (20)

PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
PPTX
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
PPTX
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
PPTX
Careto: Unmasking a New Level in APT-ware
Lumension
 
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
PPTX
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
PPTX
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
PPTX
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
PPTX
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
PPTX
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
PPTX
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
PPTX
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
PPTX
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Lumension
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Lumension
 

Recently uploaded (20)

PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Software Development Methodologies in 2025
KodekX
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 

State of endpoint risk v3

  • 1. The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
  • 2. Today’s Agenda 2011 Trends in the Threat Landscape State of Endpoint Risk 2011: Survey Results Summary and Recommendations Q&A
  • 3. Today’s Panelists Dr. Larry Ponemon Founder Ponemon Institute Paul Henry Security & Forensics Analyst MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE
  • 4. 2011 Threat Trends State-sponsored cyber crime will become a regular occurrence Social media goes deeper – increasing threats Security will finally arrive for virtualization Wikileaks will not go away Mobile devices will come under greater attack VoIP will be used as a covert channel in data breaches Medicare fraud via ID theft will see explosive growth View Paul’s entire blog at: http://blog.lumension.com/?p=3507
  • 5. State of Endpoint Risk 2011 Survey Results
  • 6. Ponemon Institute LLC The Institute is dedicated to advancing responsible information management practices that positively affect privacy and data protection in business and government. The Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations. Ponemon Institute is a full member of CASRO (Council of American Survey Research Organizations. Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board. The Institute has assembled more than 50 leading multinational corporations called the RIM Council , which focuses the development and execution of ethical principles for the collection and use of personal data about people and households.
  • 7. Project Summary The purpose of this study is to determine how effective organizations are in the protection of their endpoints and what they perceive are the biggest obstacles to reducing risk. Our study involves 564 respondents located in the United States who are deeply involved in their organization’s IT function. 51 percent are managers or hold higher positions in their organizations. 50 percent report directly to the chief information officer (CIO). 21 percent report to the chief information security officer (CISO). 28 percent work in IT security. 22 percent are in IT operations. 21 percent are in IT management.  Survey response Freq. Pct% Total sampling frame 11,896 100.0% Bounce-backs 1,875 15.8% Total survey responses 782 6.6% Rejected surveys 65 0.5% Final sample 717 6.0% Final sample after screening 564 4.7%
  • 8. Industry distribution of the 564 respondents
  • 9. Attributions About Endpoint Security Agree = strongly agree and agree combined. Disagree = unsure, disagree and strongly disagree combined.
  • 10. Is your IT network more secure now than it was a year ago? The study finds that the majority of respondents believe their organizations’ endpoints are vulnerable to attacks. 64 percent of respondents say their organizations’ IT networks are not more secure than last year percent or are unsure (36 percent + 28 percent).
  • 11. Which of the following incidents happened during the past year? Organizations face a variety of incidents that threaten the security of the endpoint. During the past year, 98 percent have had virus or malware network intrusions, 95 percent have had desktops and laptops or other devices stolen. Eighty-nine percent have lost sensitive data because of a negligent insider and 61 percent lost sensitive data because of a malicious insider.
  • 12. Which incidents are you seeing frequently in your IT network? The most frequently encountered IT network incidents are general malware attacks (92 percent of respondents), web-borne malware attacks (75 percent of respondents), botnet attacks (64 percent of respondents) and SQL injections (38 percent of respondents).
  • 13. Have your malware incidents increased over the past year? 43 percent of respondents say there has been a major increase in malware attacks and 22 percent say there has been a slight increase over the past year. Only 9 percent of respondents believe malware attacks have decreased over the past year.
  • 14. How many malware incidents does your org deal with monthly? 35 percent of respondents say they have had more than 50 malware attempt incidents each month. Another 27 percent believe their organizations encounter between 25 to 50 malware attacks each month. On average, that means that there can be one or more malware attacks per day.
  • 15. Where is the greatest rise of potential IT risk? (Top 3 choices) Only 11 percent say the network infrastructure environment (gateway to endpoint) and vulnerabilities within their operating systems are driving greater potential IT risks. 10 percent say removable devices such as USB sticks and/or media such as CDs and data centers are contributing to IT risks.
  • 16. Which one incident represents your biggest headache? The top three incidents that present the most difficult challenges for respondents are zero day attacks (35 percent), SQL injections (23 percent) and the exploit of existing software vulnerabilities greater than three months old (16 percent).
  • 17.   Which are the greatest IT security risks next year? (Top 3 concerns) The below chart lists in descending order what respondents perceive as the seven most serious security risks their organizations will face in the near future. Respondents predict the top three IT security risks in the next 12 months will be:
  • 18. Which endpoint technologies does your org use? Nearly everyone (98 percent) has anti-virus and anti-malware technologies in place followed by endpoint firewalls (60 percent) and intrusion detection systems
  • 19. Which endpoint technologies are most effective? Respondents reveal what we refer to as the gap between the technologies used and the technologies considered most effective.
  • 20. Is your IT organization’s operating cost increasing?
  • 21. What are the main cost drivers to increasing IT OPEX? The two main cost drivers are lost employee productivity (64 percent) and IT staff bandwidth consumption (40 percent). With respect to bandwidth, this has become a critical issue as IT and end-users access Internet sites that provide rich content such as videos.
  • 22. Does your org have application installation and usage policies? They are, however, leaving their endpoints vulnerable by allowing the indiscriminate use of applications or not enforcing policies governing the appropriate use of applications. As shown below, 38 percent of respondents have policies regarding application installation and usage but do not enforce them and one-third of organizations allow any applications to be used.
  • 23. Endpoint apps - what are the greatest challenges? (Top 3 choices) The top 3 challenges with respect to their endpoint applications are: preventing applications from being installed or executing on their endpoints (55 percent), discovering what applications are residing on the network (47 percent) and ensuring that vulnerable applications are patched (42 percent).
  • 24. What application management capabilities does your org have? Respondents say they have the following capabilities in place or plan to implement in the next 12 months:
  • 25. Which Web 2.0 challenges are of greatest concern? The concern respondents have about negligent and malicious insiders is reflected in their response to how Web 2.0/social media will affect their information risk environment. The top Web 2.0/social media challenges facing respondents’ organizations are: ability for IT to identify applications in use across the IT network (59 percent), ability to manage the risk of inadvertent exposure of data (51 percent) and increasing malware (48 percent).
  • 26. Are any of these applications forbidden by policy or blocked? When it comes to IT security, which applications concern you the most in terms of increasing vulnerabilities and IT risk? Web applications Pct% Mozilla Firefox 2% Apple apps 8% VMware 14% Apple/Mac OS 15% WinZip 19% Oracle applications 39% Microsoft OS/applications 44% Google Docs 46% Adobe 54% 3rd party applications outside of Microsoft 58%
  • 27. Do you have a dedicated team for patch/vulnerability management? Twenty-six percent have not changed their priorities regarding patch/vulnerability management. Fifty-two percent say they do not have a dedicated team for patch/vulnerability management. One-third of respondents say they do have a dedicated team and 15 percent are planning to create one.
  • 28. Summary of Findings Current approaches to endpoint security are ineffective and costly. Organizations do not feel more secure than they did last year. This is mainly due to the use of ineffective technology solutions when better, more effective/efficient technologies exist but are not heavily implemented. IT operating expenses are increasing and a main driver of those costs is tied directly to an increase in malware incidents. 59 percent of respondents consider malware a significant factor in those cost drivers. Malware is on the rise with attack vectors focused more on third-party and web-based applications.
  • 29. Q&A
  • 30. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 [email_address]

Editor's Notes

  • #3: © Copyright 2008 - Lumension Security
  • #6: Larry