Navigation Links
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
Date:11/17/2009

Ineffective budget allocations, poor IT collaboration present serious challenge to data security.

Scottsdale, AZ (PRWEB) Nov. 17, 2009 -- The adoption of mobile devices, cloud computing and collaborative technologies is happening faster than companies are able to adapt security policies, resulting in greater risk to sensitive corporate and personal data, according to Worldwide State of the Endpoint 2010, a new Ponemon Institute study commissioned by Lumension. Insufficient resources and a lack of C-level support for security initiatives were cited among the reasons for these shortcomings.

Key Findings:

 
  • 56 percent of individuals surveyed said mobile devices are not secure, representing a risk to data security;
  • 49 percent of individuals surveyed said data security is not a strategic initiative for their companies;
  • 48 percent of individuals surveyed said their companies have allocated insufficient resources to achieve effective data security and regulatory compliance;
  • 47 percent of individuals cited a lack of strong CEO support for information security efforts as a reason for ineffective data security programs; and
  • 41 percent of individuals said there was a lack of proactive security risk management in their organizations.

Key Insights:
 
  • The Worldwide State of the Endpoint 2010 study was conducted to better understand how emerging technologies, such as Web 2.0, mobile computing and the “consumerization” of IT – the accommodation and integration of employee-owned mobile devices within the corporate enterprise – are affecting business environments and how organizations are managing security risks across IT operations and security; and,
  • Significant perception gaps exist between IT security and IT operations professionals related to the complexity of security technologies, misalignment of IT and business objectives, technology integration, and employee skill and knowledge.

Other Findings:
 
  • 44 percent of organizations subsidize or plan to subsidize employees’ mobile devices, 40 percent of organizations say employees can connect their own devices to the company network, and 26 percent have policies permitting employees to connect their own devices to the company network;
  • 31 percent of respondents said collaboration between IT security and IT operations was non-existent;
  • 72 percent of respondents view negligent insiders as a top security threat heading into 2010; and,
  • The five most important features for managing endpoint security were identified as:
     o        Anti-virus and anti-malware technology (80 percent)
     o        Whole disk encryption (70 percent)
     o        Application control (69 percent)
     o        Patch and remediation management (68 percent)
     o        IT asset management (61 percent)

Supporting Quotes
Patrick J. Clawson, chairman & CEO, Lumension

 
  • “This year’s Ponemon Survey reinforces the need for IT security and IT operations practitioners to continually look for better alignment points within their organizations. It’s clear that the level of collaboration between these two groups is still very poor and, as a result, organizations are still grappling with how to most effectively manage and protect their endpoints.”
  • “For organizations to feel truly secure in 2010, two things need to happen, in my opinion. One — organizations need to address the growing endpoint complexity that has been exacerbated by point technologies. Central to this would be to look at adopting an endpoint platform- or suite-based approach where several technologies can be integrated and operation and security functions can be addressed with greater efficiency. And two, organizations must think about how to generate greater convergence across their IT operations and security functions for better communication, collaboration and visibility in order to better optimize security to address risks. Threats to the endpoint are not going to disappear in 2010, so it’s time for organizations to be more aggressive, more proactive and much more collaborative.”

Larry Ponemon, chairman and founder, The Ponemon Institute
 
  • “The State of the Endpoint provides still more evidence that companies are racing to adopt new technologies faster than they can understand their impacts on data security and develop effective use and integration policies. As a result, networks are growing more and more complex, making the task of securing sensitive data more and more difficult.”
  • “Endpoint security has always been a challenge, but the State of the Endpoint has identified the factors IT professionals say are responsible for their biggest headaches. Not surprisingly, a lack of CEO support and insufficient resources are among the culprits.”

Methodology:
The Worldwide State of the Endpoint 2010 was derived from a survey of 1,427 IT security practitioners and 1,582 IT operations professionals across the U.S., Germany, Australia, New Zealand and the UK who have active responsibility for their data security and compliance efforts.

Supporting Resources:

 

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Ireland, Spain, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at lumension.com.

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.

###

Read the full story at http://www.prweb.com/releases/2009/11/prweb3216424.htm.


'/>"/>
Source: PRWeb
Copyright©2009 Vocus, Inc.
All rights reserved  

Related medicine news :

1. Penn study finds pro-death proteins required to regulate healthy immune function
2. New study shows promise in reducing surgical risks associated with surgical bleeding
3. Study, meta-analysis examine factors associated with death from heatstroke
4. Study suggests loss of 2 types of neurons -- not just 1 -- triggers Parkinsons symptoms
5. Study says COPD testing is not measuring up
6. Preclinical study suggests organ-transplant drug may aid in lupus fight
7. Ability to cope with stress can increase good cholesterol in older white men, study finds
8. High alcohol consumption increases stroke risk, Tulane study says
9. Mailman School of Public Health study examines link between racial discrimination and substance use
10. Pitt study finds inequality in tobacco advertising
11. Stanford study highlights cost-effective method of lowering heart disease risks
Post Your Comments:
*Name:
*Comment:
*Email:
Related Image:
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
(Date:3/23/2017)... Las Vegas, Nevada (PRWEB) , ... March 23, 2017 , ... ... March 25th from 10am - 2pm. All events will be located in the ... will be hosting a no-cost Child ID event. No appointment is necessary and each ...
(Date:3/23/2017)... ... March 23, 2017 , ... “Wounded Woman Be Ye Healed-Passing ... Ye Healed-Passing On A Legacy” is the creation of published author, Desiree M Webb, ... grief ministry. She has been happily married to her husband, Paul, for over ...
(Date:3/23/2017)... ... March 23, 2017 , ... “The Trainer”: an electrifying and suspenseful gunslinger ... fiction writer with an active imagination and an enthusiasm for action and adventure stories. ... of Wild Bill Hart, who sat looking at the thirty-three notches that lined the ...
(Date:3/22/2017)... ... March 22, 2017 , ... ... publication of the first issue of its companion print magazine. The new magazine, ... cosmetic surgery thanks to information provided by board-certified doctors from across the country. ...
(Date:3/22/2017)... (PRWEB) , ... March 22, 2017 , ... ... experts to create a PCSK9 inhibitor prior authorization (PA) form for prescribers to ... It is one of the helpful tools published as part of the article ...
Breaking Medicine News(10 mins):
(Date:3/22/2017)... Corp. (NASDAQ: DRIO), a leading global digital health ... today reported financial and operational results for the ... 2016. 2016 Highlights ... to the full year 2015  ... Direct-to-consumer model launched in U.S. ...
(Date:3/22/2017)... , March 22, 2017 Ampio ... the development of Ampion™, a low molecular weight ... today announced that it is re-issuing its previous release ... incorporate certain disclosures that are required under the ... below are these additional disclosures along with the ...
(Date:3/22/2017)... Serve You Rx Vermont, LLC, a wholly owned ... based in Milwaukee, Wisconsin , has acquired ... Middlebury, Vermont , from Pharmacy Health Services, ... it was perfect timing for this opportunity to present itself," ... You. "Like us, NEMOP has a high-touch service model, which ...
Breaking Medicine Technology: