Navigation Links
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
Date:11/17/2009

Ineffective budget allocations, poor IT collaboration present serious challenge to data security.

Scottsdale, AZ (PRWEB) Nov. 17, 2009 -- The adoption of mobile devices, cloud computing and collaborative technologies is happening faster than companies are able to adapt security policies, resulting in greater risk to sensitive corporate and personal data, according to Worldwide State of the Endpoint 2010, a new Ponemon Institute study commissioned by Lumension. Insufficient resources and a lack of C-level support for security initiatives were cited among the reasons for these shortcomings.

Key Findings:

 
  • 56 percent of individuals surveyed said mobile devices are not secure, representing a risk to data security;
  • 49 percent of individuals surveyed said data security is not a strategic initiative for their companies;
  • 48 percent of individuals surveyed said their companies have allocated insufficient resources to achieve effective data security and regulatory compliance;
  • 47 percent of individuals cited a lack of strong CEO support for information security efforts as a reason for ineffective data security programs; and
  • 41 percent of individuals said there was a lack of proactive security risk management in their organizations.

Key Insights:
 
  • The Worldwide State of the Endpoint 2010 study was conducted to better understand how emerging technologies, such as Web 2.0, mobile computing and the “consumerization” of IT – the accommodation and integration of employee-owned mobile devices within the corporate enterprise – are affecting business environments and how organizations are managing security risks across IT operations and security; and,
  • Significant perception gaps exist between IT security and IT operations professionals related to the complexity of security technologies, misalignment of IT and business objectives, technology integration, and employee skill and knowledge.

Other Findings:
 
  • 44 percent of organizations subsidize or plan to subsidize employees’ mobile devices, 40 percent of organizations say employees can connect their own devices to the company network, and 26 percent have policies permitting employees to connect their own devices to the company network;
  • 31 percent of respondents said collaboration between IT security and IT operations was non-existent;
  • 72 percent of respondents view negligent insiders as a top security threat heading into 2010; and,
  • The five most important features for managing endpoint security were identified as:
     o        Anti-virus and anti-malware technology (80 percent)
     o        Whole disk encryption (70 percent)
     o        Application control (69 percent)
     o        Patch and remediation management (68 percent)
     o        IT asset management (61 percent)

Supporting Quotes
Patrick J. Clawson, chairman & CEO, Lumension

 
  • “This year’s Ponemon Survey reinforces the need for IT security and IT operations practitioners to continually look for better alignment points within their organizations. It’s clear that the level of collaboration between these two groups is still very poor and, as a result, organizations are still grappling with how to most effectively manage and protect their endpoints.”
  • “For organizations to feel truly secure in 2010, two things need to happen, in my opinion. One — organizations need to address the growing endpoint complexity that has been exacerbated by point technologies. Central to this would be to look at adopting an endpoint platform- or suite-based approach where several technologies can be integrated and operation and security functions can be addressed with greater efficiency. And two, organizations must think about how to generate greater convergence across their IT operations and security functions for better communication, collaboration and visibility in order to better optimize security to address risks. Threats to the endpoint are not going to disappear in 2010, so it’s time for organizations to be more aggressive, more proactive and much more collaborative.”

Larry Ponemon, chairman and founder, The Ponemon Institute
 
  • “The State of the Endpoint provides still more evidence that companies are racing to adopt new technologies faster than they can understand their impacts on data security and develop effective use and integration policies. As a result, networks are growing more and more complex, making the task of securing sensitive data more and more difficult.”
  • “Endpoint security has always been a challenge, but the State of the Endpoint has identified the factors IT professionals say are responsible for their biggest headaches. Not surprisingly, a lack of CEO support and insufficient resources are among the culprits.”

Methodology:
The Worldwide State of the Endpoint 2010 was derived from a survey of 1,427 IT security practitioners and 1,582 IT operations professionals across the U.S., Germany, Australia, New Zealand and the UK who have active responsibility for their data security and compliance efforts.

Supporting Resources:

 

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Ireland, Spain, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at lumension.com.

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.

###

Read the full story at http://www.prweb.com/releases/2009/11/prweb3216424.htm.


'/>"/>
Source: PRWeb
Copyright©2009 Vocus, Inc.
All rights reserved  

Related medicine news :

1. Penn study finds pro-death proteins required to regulate healthy immune function
2. New study shows promise in reducing surgical risks associated with surgical bleeding
3. Study, meta-analysis examine factors associated with death from heatstroke
4. Study suggests loss of 2 types of neurons -- not just 1 -- triggers Parkinsons symptoms
5. Study says COPD testing is not measuring up
6. Preclinical study suggests organ-transplant drug may aid in lupus fight
7. Ability to cope with stress can increase good cholesterol in older white men, study finds
8. High alcohol consumption increases stroke risk, Tulane study says
9. Mailman School of Public Health study examines link between racial discrimination and substance use
10. Pitt study finds inequality in tobacco advertising
11. Stanford study highlights cost-effective method of lowering heart disease risks
Post Your Comments:
*Name:
*Comment:
*Email:
Related Image:
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
(Date:5/3/2016)... ... May 03, 2016 , ... Hydra Skin Sciences, a top-rated skincare company ... a revolutionary new anti-aging skin care product that integrates Snow Algae Powder ... sold over seventy-five thousand units worldwide within the first two months of release. , ...
(Date:5/3/2016)... ... , ... Dave Newberry, broker/owner of Newberry Realty, recently announced his office will ... on Friday, May 20. “We have raised over $1,000 for the table to support ... , PICC is a local Kent, WA, clinic that cares for drug-exposed babies and ...
(Date:5/2/2016)... ... 2016 , ... RNK Products, Inc. (RNK) is beta testing ... the stethoscope stream to go over the video conferencing audio channel. This ... , Remote auscultation involves two software elements on the PC: , 1)    Network transport ...
(Date:5/2/2016)... ... , ... ProElectric Cartoon is a package of 30 hand-drawn electrifying animations made ... of electric styles including zap, sizzles, and more. Easily alter the highlights, midtones, and ... rotation, and much more. ProElectric Cartoon’s simplistic style makes it the perfect complement for ...
(Date:5/2/2016)... Texas (PRWEB) , ... May 02, 2016 , ... Pets ... As a token of appreciation, pet owners celebrate National Pet Week, which falls on ... in 2016, remind pet owners to cherish the human-animal bond and recognize responsible pet ...
Breaking Medicine News(10 mins):
(Date:4/28/2016)... , April 28, 2016 ... "Global Plastic Surgery Products Market 2016-2020" report ... ) , The global plastic surgery ... of 9.47% during the period 2016-2020. , ,The growing ... leading to the growth of the market. Lasers are ...
(Date:4/28/2016)... NEW YORK , April 28, 2016  The ... reached 275 million dollars, according to Kalorama Information and ... includes typing, immunoassays and nucleic acid testing.  The healthcare ... had made progress in developing blood collection stations and ... was made in Kalorama Information,s report, Blood ...
(Date:4/28/2016)... 28, 2016 Dr. Vivek Ahuja ... and Ste phen Schmidt ... leading provider of cloud-based software solutions for life sciences, today announced ... bring a wealth of insight to a growing business.  This will ... George Phillips joined ArisGlobal in the position of ...
Breaking Medicine Technology: