Navigation Links
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
Date:11/17/2009

Ineffective budget allocations, poor IT collaboration present serious challenge to data security.

Scottsdale, AZ (PRWEB) Nov. 17, 2009 -- The adoption of mobile devices, cloud computing and collaborative technologies is happening faster than companies are able to adapt security policies, resulting in greater risk to sensitive corporate and personal data, according to Worldwide State of the Endpoint 2010, a new Ponemon Institute study commissioned by Lumension. Insufficient resources and a lack of C-level support for security initiatives were cited among the reasons for these shortcomings.

Key Findings:

 
  • 56 percent of individuals surveyed said mobile devices are not secure, representing a risk to data security;
  • 49 percent of individuals surveyed said data security is not a strategic initiative for their companies;
  • 48 percent of individuals surveyed said their companies have allocated insufficient resources to achieve effective data security and regulatory compliance;
  • 47 percent of individuals cited a lack of strong CEO support for information security efforts as a reason for ineffective data security programs; and
  • 41 percent of individuals said there was a lack of proactive security risk management in their organizations.

Key Insights:
 
  • The Worldwide State of the Endpoint 2010 study was conducted to better understand how emerging technologies, such as Web 2.0, mobile computing and the “consumerization” of IT – the accommodation and integration of employee-owned mobile devices within the corporate enterprise – are affecting business environments and how organizations are managing security risks across IT operations and security; and,
  • Significant perception gaps exist between IT security and IT operations professionals related to the complexity of security technologies, misalignment of IT and business objectives, technology integration, and employee skill and knowledge.

Other Findings:
 
  • 44 percent of organizations subsidize or plan to subsidize employees’ mobile devices, 40 percent of organizations say employees can connect their own devices to the company network, and 26 percent have policies permitting employees to connect their own devices to the company network;
  • 31 percent of respondents said collaboration between IT security and IT operations was non-existent;
  • 72 percent of respondents view negligent insiders as a top security threat heading into 2010; and,
  • The five most important features for managing endpoint security were identified as:
     o        Anti-virus and anti-malware technology (80 percent)
     o        Whole disk encryption (70 percent)
     o        Application control (69 percent)
     o        Patch and remediation management (68 percent)
     o        IT asset management (61 percent)

Supporting Quotes
Patrick J. Clawson, chairman & CEO, Lumension

 
  • “This year’s Ponemon Survey reinforces the need for IT security and IT operations practitioners to continually look for better alignment points within their organizations. It’s clear that the level of collaboration between these two groups is still very poor and, as a result, organizations are still grappling with how to most effectively manage and protect their endpoints.”
  • “For organizations to feel truly secure in 2010, two things need to happen, in my opinion. One — organizations need to address the growing endpoint complexity that has been exacerbated by point technologies. Central to this would be to look at adopting an endpoint platform- or suite-based approach where several technologies can be integrated and operation and security functions can be addressed with greater efficiency. And two, organizations must think about how to generate greater convergence across their IT operations and security functions for better communication, collaboration and visibility in order to better optimize security to address risks. Threats to the endpoint are not going to disappear in 2010, so it’s time for organizations to be more aggressive, more proactive and much more collaborative.”

Larry Ponemon, chairman and founder, The Ponemon Institute
 
  • “The State of the Endpoint provides still more evidence that companies are racing to adopt new technologies faster than they can understand their impacts on data security and develop effective use and integration policies. As a result, networks are growing more and more complex, making the task of securing sensitive data more and more difficult.”
  • “Endpoint security has always been a challenge, but the State of the Endpoint has identified the factors IT professionals say are responsible for their biggest headaches. Not surprisingly, a lack of CEO support and insufficient resources are among the culprits.”

Methodology:
The Worldwide State of the Endpoint 2010 was derived from a survey of 1,427 IT security practitioners and 1,582 IT operations professionals across the U.S., Germany, Australia, New Zealand and the UK who have active responsibility for their data security and compliance efforts.

Supporting Resources:

 

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Ireland, Spain, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at lumension.com.

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.

###

Read the full story at http://www.prweb.com/releases/2009/11/prweb3216424.htm.


'/>"/>
Source: PRWeb
Copyright©2009 Vocus, Inc.
All rights reserved  

Related medicine news :

1. Penn study finds pro-death proteins required to regulate healthy immune function
2. New study shows promise in reducing surgical risks associated with surgical bleeding
3. Study, meta-analysis examine factors associated with death from heatstroke
4. Study suggests loss of 2 types of neurons -- not just 1 -- triggers Parkinsons symptoms
5. Study says COPD testing is not measuring up
6. Preclinical study suggests organ-transplant drug may aid in lupus fight
7. Ability to cope with stress can increase good cholesterol in older white men, study finds
8. High alcohol consumption increases stroke risk, Tulane study says
9. Mailman School of Public Health study examines link between racial discrimination and substance use
10. Pitt study finds inequality in tobacco advertising
11. Stanford study highlights cost-effective method of lowering heart disease risks
Post Your Comments:
*Name:
*Comment:
*Email:
Related Image:
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
(Date:6/27/2016)... NY (PRWEB) , ... June 27, 2016 , ... ... using cutting edge technology to revolutionize the emergency ambulance transport experience for the ... are aware of how Uber has disrupted the taxi industry through the use ...
(Date:6/26/2016)... Carolina (PRWEB) , ... June 26, 2016 , ... ... of a new product that was developed to enhance the health of felines. The ... centuries. , The two main herbs in the PawPaws Cat Kidney Support ...
(Date:6/25/2016)... , ... June 25, 2016 , ... The temporary closing of Bruton Memorial Library on ... Observer , brings up a new, often overlooked aspect of head lice: the parasite’s ability ... fumigation is not a common occurrence, but a necessary one in the event that lice ...
(Date:6/25/2016)... ... ... Friday, June 10, Van Mitchell, Secretary of the Maryland Department of Health and Mental ... exemplary accomplishments in worksite health promotion. , The Wellness at Work Awards took place ... BWI Marriott in Linthicum Heights. iHire was one of 42 businesses to receive an ...
(Date:6/24/2016)... ... June 24, 2016 , ... Marcy was in a crisis. Her son James, eight, ... at his family verbally and physically. , “When something upset him, he couldn’t control his ... it. He would throw rocks at my other children and say he was going to ...
Breaking Medicine News(10 mins):
(Date:6/26/2016)... Story Highlights: ... the health care industry is causing providers to review ... Deloitte offers a suite of solutions for health care ... cost optimization: labor resource analysis, revenue cycle optimization and ... outcomes and better economics ...
(Date:6/24/2016)... June 24, 2016  Global Blood Therapeutics, Inc. (GBT) ... developing novel therapeutics for the treatment of grievous ... the closing of its previously announced underwritten public ... the public offering price of $18.75 per share. ... offered by GBT. GBT estimates net proceeds from ...
(Date:6/24/2016)... June 24, 2016 Research ... "Structural Electronics 2015-2025: Applications, Technologies, Forecasts" ... In-Mold Electronics, Smart Skin, Structural Health ... Structural electronics involves electronic and/or electrical ... structures, replacing dumb structures such as vehicle bodies ...
Breaking Medicine Technology: