Ineffective budget allocations, poor IT collaboration present
serious challenge to data security.
Scottsdale, AZ (PRWEB) Nov. 17, 2009 -- The adoption of mobile devices, cloud computing and collaborative technologies is happening faster than companies are able to adapt security policies, resulting in greater risk to sensitive corporate and personal data, according to Worldwide State of the Endpoint 2010, a new Ponemon Institute study commissioned by Lumension. Insufficient resources and a lack of C-level support for security initiatives were cited among the reasons for these shortcomings.
- 56 percent of individuals surveyed said mobile devices are not secure, representing a risk to data security;
- 49 percent of individuals surveyed said data security is not a strategic initiative for their companies;
- 48 percent of individuals surveyed said their companies have allocated insufficient resources to achieve effective data security and regulatory compliance;
- 47 percent of individuals cited a lack of strong CEO support for information security efforts as a reason for ineffective data security programs; and
- 41 percent of individuals said there was a lack of proactive security risk management in their organizations.
- The Worldwide State of the Endpoint 2010 study was conducted to better understand how emerging technologies, such as Web 2.0, mobile computing and the “consumerization” of IT – the accommodation and integration of employee-owned mobile devices within the corporate enterprise – are affecting business environments and how organizations are managing security risks across IT operations and security; and,
- Significant perception gaps exist between IT security and IT operations professionals related to the complexity of security technologies, misalignment of IT and business objectives, technology integration, and employee skill and knowledge.
- 44 percent of organizations subsidize or plan to subsidize employees’ mobile devices, 40 percent of organizations say employees can connect their own devices to the company network, and 26 percent have policies permitting employees to connect their own devices to the company network;
- 31 percent of respondents said collaboration between IT security and IT operations was non-existent;
- 72 percent of respondents view negligent insiders as a top security threat heading into 2010; and,
- The five most important features for managing endpoint security were identified as:
o Anti-virus and anti-malware technology (80 percent)
o Whole disk encryption (70 percent)
o Application control (69 percent)
o Patch and remediation management
o IT asset management (61 percent)
Patrick J. Clawson, chairman & CEO, Lumension
- “This year’s Ponemon Survey reinforces the need for IT security and IT operations practitioners to continually look for better alignment points within their organizations. It’s clear that the level of collaboration between these two groups is still very poor and, as a result, organizations are still grappling with how to most effectively manage and protect their endpoints.”
- “For organizations to feel truly secure in 2010, two things need to happen, in my opinion. One — organizations need to address the growing endpoint complexity that has been exacerbated by point technologies. Central to this would be to look at adopting an endpoint platform- or suite-based approach where several technologies can be integrated and operation and security functions can be addressed with greater efficiency. And two, organizations must think about how to generate greater convergence across their IT operations and security functions for better communication, collaboration and visibility in order to better optimize security to address risks. Threats to the endpoint are not going to disappear in 2010, so it’s time for organizations to be more aggressive, more proactive and much more collaborative.”
Larry Ponemon, chairman and founder, The Ponemon Institute
- “The State of the Endpoint provides still more evidence that companies are racing to adopt new technologies faster than they can understand their impacts on data security and develop effective use and integration policies. As a result, networks are growing more and more complex, making the task of securing sensitive data more and more difficult.”
- “Endpoint security has always been a challenge, but the State of the Endpoint has identified the factors IT professionals say are responsible for their biggest headaches. Not surprisingly, a lack of CEO support and insufficient resources are among the culprits.”
The Worldwide State of the Endpoint 2010 was derived from a survey of 1,427 IT security practitioners and 1,582 IT operations professionals across the U.S., Germany, Australia, New Zealand and the UK who have active responsibility for their data security and compliance efforts.
About Lumension Security, Inc.
, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Ireland, Spain, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at lumension.com.
About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.
Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.
Read the full story at http://www.prweb.com/releases/2009/11/prweb3216424.htm.
Related medicine news :1
Copyright©2009 Vocus, Inc.
All rights reserved
. Penn study finds pro-death proteins required to regulate healthy immune function2
. New study shows promise in reducing surgical risks associated with surgical bleeding3
. Study, meta-analysis examine factors associated with death from heatstroke4
. Study suggests loss of 2 types of neurons -- not just 1 -- triggers Parkinsons symptoms5
. Study says COPD testing is not measuring up6
. Preclinical study suggests organ-transplant drug may aid in lupus fight7
. Ability to cope with stress can increase good cholesterol in older white men, study finds8
. High alcohol consumption increases stroke risk, Tulane study says9
. Mailman School of Public Health study examines link between racial discrimination and substance use10
. Pitt study finds inequality in tobacco advertising11
. Stanford study highlights cost-effective method of lowering heart disease risks