Navigation Links
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment

Ineffective budget allocations, poor IT collaboration present serious challenge to data security.

Scottsdale, AZ (PRWEB) Nov. 17, 2009 -- The adoption of mobile devices, cloud computing and collaborative technologies is happening faster than companies are able to adapt security policies, resulting in greater risk to sensitive corporate and personal data, according to Worldwide State of the Endpoint 2010, a new Ponemon Institute study commissioned by Lumension. Insufficient resources and a lack of C-level support for security initiatives were cited among the reasons for these shortcomings.

Key Findings:

  • 56 percent of individuals surveyed said mobile devices are not secure, representing a risk to data security;
  • 49 percent of individuals surveyed said data security is not a strategic initiative for their companies;
  • 48 percent of individuals surveyed said their companies have allocated insufficient resources to achieve effective data security and regulatory compliance;
  • 47 percent of individuals cited a lack of strong CEO support for information security efforts as a reason for ineffective data security programs; and
  • 41 percent of individuals said there was a lack of proactive security risk management in their organizations.

Key Insights:
  • The Worldwide State of the Endpoint 2010 study was conducted to better understand how emerging technologies, such as Web 2.0, mobile computing and the “consumerization” of IT – the accommodation and integration of employee-owned mobile devices within the corporate enterprise – are affecting business environments and how organizations are managing security risks across IT operations and security; and,
  • Significant perception gaps exist between IT security and IT operations professionals related to the complexity of security technologies, misalignment of IT and business objectives, technology integration, and employee skill and knowledge.

Other Findings:
  • 44 percent of organizations subsidize or plan to subsidize employees’ mobile devices, 40 percent of organizations say employees can connect their own devices to the company network, and 26 percent have policies permitting employees to connect their own devices to the company network;
  • 31 percent of respondents said collaboration between IT security and IT operations was non-existent;
  • 72 percent of respondents view negligent insiders as a top security threat heading into 2010; and,
  • The five most important features for managing endpoint security were identified as:
     o        Anti-virus and anti-malware technology (80 percent)
     o        Whole disk encryption (70 percent)
     o        Application control (69 percent)
     o        Patch and remediation management (68 percent)
     o        IT asset management (61 percent)

Supporting Quotes
Patrick J. Clawson, chairman & CEO, Lumension

  • “This year’s Ponemon Survey reinforces the need for IT security and IT operations practitioners to continually look for better alignment points within their organizations. It’s clear that the level of collaboration between these two groups is still very poor and, as a result, organizations are still grappling with how to most effectively manage and protect their endpoints.”
  • “For organizations to feel truly secure in 2010, two things need to happen, in my opinion. One — organizations need to address the growing endpoint complexity that has been exacerbated by point technologies. Central to this would be to look at adopting an endpoint platform- or suite-based approach where several technologies can be integrated and operation and security functions can be addressed with greater efficiency. And two, organizations must think about how to generate greater convergence across their IT operations and security functions for better communication, collaboration and visibility in order to better optimize security to address risks. Threats to the endpoint are not going to disappear in 2010, so it’s time for organizations to be more aggressive, more proactive and much more collaborative.”

Larry Ponemon, chairman and founder, The Ponemon Institute
  • “The State of the Endpoint provides still more evidence that companies are racing to adopt new technologies faster than they can understand their impacts on data security and develop effective use and integration policies. As a result, networks are growing more and more complex, making the task of securing sensitive data more and more difficult.”
  • “Endpoint security has always been a challenge, but the State of the Endpoint has identified the factors IT professionals say are responsible for their biggest headaches. Not surprisingly, a lack of CEO support and insufficient resources are among the culprits.”

The Worldwide State of the Endpoint 2010 was derived from a survey of 1,427 IT security practitioners and 1,582 IT operations professionals across the U.S., Germany, Australia, New Zealand and the UK who have active responsibility for their data security and compliance efforts.

Supporting Resources:


About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Luxembourg, the United Kingdom, Ireland, Spain, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.


Read the full story at

Source: PRWeb
Copyright©2009 Vocus, Inc.
All rights reserved  

Related medicine news :

1. Penn study finds pro-death proteins required to regulate healthy immune function
2. New study shows promise in reducing surgical risks associated with surgical bleeding
3. Study, meta-analysis examine factors associated with death from heatstroke
4. Study suggests loss of 2 types of neurons -- not just 1 -- triggers Parkinsons symptoms
5. Study says COPD testing is not measuring up
6. Preclinical study suggests organ-transplant drug may aid in lupus fight
7. Ability to cope with stress can increase good cholesterol in older white men, study finds
8. High alcohol consumption increases stroke risk, Tulane study says
9. Mailman School of Public Health study examines link between racial discrimination and substance use
10. Pitt study finds inequality in tobacco advertising
11. Stanford study highlights cost-effective method of lowering heart disease risks
Post Your Comments:
Related Image:
New Ponemon-Lumension Study Reveals Companies Slow to Adapt to Changing Security, Technology Environment
(Date:11/27/2015)... ... November 27, 2015 , ... The print component ... Today in Atlanta, Dallas, New York, Minneapolis, South Florida, with a circulation of ... distributed nationally, through a vast social media strategy and across a network of ...
(Date:11/27/2015)... Wilmington, DE (PRWEB) , ... November 27, 2015 ... ... a member of the well-respected Microsoft Dynamics SL User Group (MSDSLUG). Recognized as ... is an independent group of Microsoft Dynamics SL software users, partners, industry experts ...
(Date:11/27/2015)... ... November 27, 2015 , ... CBD College is ... Health Education Programs (CAAHEP) awarded accreditation to its Diagnostic Medical Sonography program. CBD College ... as only one of twelve colleges and universities in the state of California make ...
(Date:11/27/2015)... , ... November 27, 2015 , ... ... center software Q-Suite, announces the incorporation of Asterisk 11 LTS (Long Term Support) ... supported Asterisk 11 LTS brings Q-Suite 5.10 up-to-date with a version of Asterisk ...
(Date:11/26/2015)... ... November 26, 2015 , ... ... Travel Representative. As a franchise owner, Somu now offers travelers, value and care ... wedding packages, private cruise sales, as well as, cabin upgrades and special amenities ...
Breaking Medicine News(10 mins):
(Date:11/26/2015)... November 26, 2015 ... the "Radioimmunoassay Market by Type (Reagents ... Industry, Academics, Clinical Diagnostic Labs), Application (Research, ... to 2020" report to their offering. ... the addition of the "Radioimmunoassay Market ...
(Date:11/25/2015)... WASHINGTON , Nov. 25, 2015  The ... Obstetricians and Gynecologists (ACOG), and the March of ... bipartisan Protecting Our Infants Act of 2015 ... the number of newborns born exposed to drugs, ... Since the bill,s introduction, all three organizations have ...
(Date:11/25/2015)... MELVILLE, N.Y. , Nov. 25, 2015  Henry ... products and services to office-based dental, medical and animal ... Dental (GNYDM) Meeting the Henry Schein ConnectDental® Pavilion ... industry,s broadest array of open solutions designed to help ... Click here for a schedule of ...
Breaking Medicine Technology: