SlideShare uma empresa Scribd logo
1 de 22
© 2015 ForeScout Technologies, Page 2
• How well are IT security managers’ needs being met?
– Collaboration between IT security systems
– Automation of security controls
– Continuous monitoring and mitigation
• Finding: Huge gulf between expectation and reality
© 2015 ForeScout Technologies, Page 3
FIREWALL SIEM ATD ENDPOINT EMMVA PATCH
IBM
IBM
© 2015 ForeScout Technologies, Page 4
Gartner, “Designing an Adaptive Security
Architecture for Protection From Advanced
Attacks”, Neil MacDonald and Peter
Firstbrook, 12 February 2014, refreshed
November 19, 2014
“The end result should not be 12
silos of disparate information
security solutions. The end goal
should be that these different
capabilities integrate and share
information to build a security
protection system that is more
adaptive and intelligent overall.”
Figure 1. The Four Stages of an Adaptive Protection Architecture
Source: Gartner (February 2014)
© 2015 ForeScout Technologies, Page 5
• 345 corporate executives and consultants with
information security responsibility
• North America
• Diverse industries: Technology, financial, government,
healthcare, education, manufacturing, utilities, retail
© 2015 ForeScout Technologies, Page 6
“How many security systems (such as, antivirus, mobile device management, vulnerability assessment, firewall,
intrusion prevention, web security, email security, encryption, SIEM, data loss prevention, etc.) do you own?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
13Or more security
systems
© 2015 ForeScout Technologies, Page 7
“Disregarding your SIEM (if you have one), how many of your security and IT management systems directly share
security-related context or control information with one another?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
1to
3directly share
security-related context
© 2015 ForeScout Technologies, Page 8
“How many of your existing security systems (such as, vulnerability assessment, network behavior analysis, etc.)
and risk analysis systems (such as SIEM solutions) can mitigate risk /threats or remediate problems?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
1to
3can mitigate risks
or remediate problems
© 2015 ForeScout Technologies, Page 9
“How helpful would it be if your IT security and management systems were to share information about devices,
applications, users, and vulnerabilities on your network?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
95%
“Helpful or
Very Helpful”
© 2015 ForeScout Technologies, Page 10
“How helpful would it be if the majority of your security systems and risk analysis systems were linked to
automated security controls, such as firewalls, network access control or patch management systems?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
93%
“Helpful or
Very Helpful”
© 2015 ForeScout Technologies, Page 11
1. Current state
– Many different IT security systems are being used
– Information sharing between systems is rare
– Automated mitigation is rare
2. Desired state
– Strongly desire more information sharing
– Strongly desire more automated mitigation
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
Data loss prevention
The
Gap
Is
Huge
© 2015 ForeScout Technologies, Page 12
“More integrated controls would help our IT organization
identify, investigate, respond and resolve security
incidents”
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
97%
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
© 2015 ForeScout Technologies, Page 13
“More integrated controls would help our IT organization
identify, investigate, respond and resolve security
incidents”
“Automated security controls would have allowed us to
avoid a compromise or reduce the impact of the
compromise that we experienced in the last year”
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
97%
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
57%
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
© 2015 ForeScout Technologies, Page 14
“More integrated controls would help our IT organization
identify, investigate, respond and resolve security
incidents”
“Automated security controls would have allowed us to
avoid a compromise or reduce the impact of the
compromise that we experienced in the last year”
“Automated security controls will help prevent future
compromise”
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
97%
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
57%
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
78%
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
© 2015 ForeScout Technologies, Page 15
“Are your security processes (e.g. assessment and patching) mainly done on a periodic basis (weekly, monthly,
etc.) or mainly done continuously?”
“Continuous”Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
43%
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
© 2015 ForeScout Technologies, Page 16
“Are your security processes (e.g. assessment and patching) mainly done on a periodic basis (weekly, monthly,
etc.) or mainly done continuously?”
“Continuous”
“Planning to shift toward continuous in the next 12 to 24
months”
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
43%
Antivirus
Mobile device management
Vulnerability assessment
Firewall
Intrusion prevention
Web security
Email security
Encryption
SIEM
64%
“Is your organization planning to shift your security processes toward more continuous monitoring and mitigation?”
Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
© 2015 ForeScout Technologies, Page 17
IT Security Managers Reality
• Strongly want IT security
products to share information
• Very few IT security products
share information
© 2015 ForeScout Technologies, Page 18
IT Security Managers Reality
• Strongly want IT security
products to share information
• Strongly want IT security
products to automatically
mitigate threats
• Very few IT security products
share information
• Very few products automatically
mitigate
© 2015 ForeScout Technologies, Page 19
IT Security Managers Reality
• Strongly want IT security
products to share information
• Strongly want IT security
products to automatically
mitigate threats
• Continuous monitoring and
mitigation
• Very few IT security products
share information
• Very few products automatically
mitigate
• Slightly less than half of
organizations practice
continuous monitoring
© 2015 ForeScout Technologies, Page 20
IT Security Managers Reality
• Strongly want IT security
products to share information
• Strongly want IT security
products to automatically
mitigate threats
• Continuous monitoring and
mitigation
• Very few IT security products
share information
• Very few products automatically
mitigate
• Slightly less than half of
organizations practice
continuous monitoring
GAP
© 2015 ForeScout Technologies, Page 22

Mais conteúdo relacionado

Mais procurados

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayIvanti
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 

Mais procurados (20)

Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 

Destaque

Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NACdigitallibrary
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NACLarry Smarr
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess ControlGionni Lúcio
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation MedCouncilCan
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDNKyunghee Univ
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISECisco Canada
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionConor Ryan
 

Destaque (10)

ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NAC
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 

Semelhante a SC Magazine & ForeScout Survey Results

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...IBM Security
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 

Semelhante a SC Magazine & ForeScout Survey Results (20)

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
16231
1623116231
16231
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

SC Magazine & ForeScout Survey Results

  • 1.
  • 2. © 2015 ForeScout Technologies, Page 2 • How well are IT security managers’ needs being met? – Collaboration between IT security systems – Automation of security controls – Continuous monitoring and mitigation • Finding: Huge gulf between expectation and reality
  • 3. © 2015 ForeScout Technologies, Page 3 FIREWALL SIEM ATD ENDPOINT EMMVA PATCH IBM IBM
  • 4. © 2015 ForeScout Technologies, Page 4 Gartner, “Designing an Adaptive Security Architecture for Protection From Advanced Attacks”, Neil MacDonald and Peter Firstbrook, 12 February 2014, refreshed November 19, 2014 “The end result should not be 12 silos of disparate information security solutions. The end goal should be that these different capabilities integrate and share information to build a security protection system that is more adaptive and intelligent overall.” Figure 1. The Four Stages of an Adaptive Protection Architecture Source: Gartner (February 2014)
  • 5. © 2015 ForeScout Technologies, Page 5 • 345 corporate executives and consultants with information security responsibility • North America • Diverse industries: Technology, financial, government, healthcare, education, manufacturing, utilities, retail
  • 6. © 2015 ForeScout Technologies, Page 6 “How many security systems (such as, antivirus, mobile device management, vulnerability assessment, firewall, intrusion prevention, web security, email security, encryption, SIEM, data loss prevention, etc.) do you own?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study. Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention 13Or more security systems
  • 7. © 2015 ForeScout Technologies, Page 7 “Disregarding your SIEM (if you have one), how many of your security and IT management systems directly share security-related context or control information with one another?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study. Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention 1to 3directly share security-related context
  • 8. © 2015 ForeScout Technologies, Page 8 “How many of your existing security systems (such as, vulnerability assessment, network behavior analysis, etc.) and risk analysis systems (such as SIEM solutions) can mitigate risk /threats or remediate problems?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study. Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention 1to 3can mitigate risks or remediate problems
  • 9. © 2015 ForeScout Technologies, Page 9 “How helpful would it be if your IT security and management systems were to share information about devices, applications, users, and vulnerabilities on your network?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study. Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention 95% “Helpful or Very Helpful”
  • 10. © 2015 ForeScout Technologies, Page 10 “How helpful would it be if the majority of your security systems and risk analysis systems were linked to automated security controls, such as firewalls, network access control or patch management systems?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study. Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention 93% “Helpful or Very Helpful”
  • 11. © 2015 ForeScout Technologies, Page 11 1. Current state – Many different IT security systems are being used – Information sharing between systems is rare – Automated mitigation is rare 2. Desired state – Strongly desire more information sharing – Strongly desire more automated mitigation Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM Data loss prevention The Gap Is Huge
  • 12. © 2015 ForeScout Technologies, Page 12 “More integrated controls would help our IT organization identify, investigate, respond and resolve security incidents” Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 97% Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
  • 13. © 2015 ForeScout Technologies, Page 13 “More integrated controls would help our IT organization identify, investigate, respond and resolve security incidents” “Automated security controls would have allowed us to avoid a compromise or reduce the impact of the compromise that we experienced in the last year” Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 97% Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 57% Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
  • 14. © 2015 ForeScout Technologies, Page 14 “More integrated controls would help our IT organization identify, investigate, respond and resolve security incidents” “Automated security controls would have allowed us to avoid a compromise or reduce the impact of the compromise that we experienced in the last year” “Automated security controls will help prevent future compromise” Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 97% Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 57% Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 78% Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
  • 15. © 2015 ForeScout Technologies, Page 15 “Are your security processes (e.g. assessment and patching) mainly done on a periodic basis (weekly, monthly, etc.) or mainly done continuously?” “Continuous”Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 43% Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
  • 16. © 2015 ForeScout Technologies, Page 16 “Are your security processes (e.g. assessment and patching) mainly done on a periodic basis (weekly, monthly, etc.) or mainly done continuously?” “Continuous” “Planning to shift toward continuous in the next 12 to 24 months” Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 43% Antivirus Mobile device management Vulnerability assessment Firewall Intrusion prevention Web security Email security Encryption SIEM 64% “Is your organization planning to shift your security processes toward more continuous monitoring and mitigation?” Answers were obtained by SC Magazine as part of 2015 IT Security Collaboration Market Study.
  • 17. © 2015 ForeScout Technologies, Page 17 IT Security Managers Reality • Strongly want IT security products to share information • Very few IT security products share information
  • 18. © 2015 ForeScout Technologies, Page 18 IT Security Managers Reality • Strongly want IT security products to share information • Strongly want IT security products to automatically mitigate threats • Very few IT security products share information • Very few products automatically mitigate
  • 19. © 2015 ForeScout Technologies, Page 19 IT Security Managers Reality • Strongly want IT security products to share information • Strongly want IT security products to automatically mitigate threats • Continuous monitoring and mitigation • Very few IT security products share information • Very few products automatically mitigate • Slightly less than half of organizations practice continuous monitoring
  • 20. © 2015 ForeScout Technologies, Page 20 IT Security Managers Reality • Strongly want IT security products to share information • Strongly want IT security products to automatically mitigate threats • Continuous monitoring and mitigation • Very few IT security products share information • Very few products automatically mitigate • Slightly less than half of organizations practice continuous monitoring GAP
  • 21.
  • 22. © 2015 ForeScout Technologies, Page 22

Notas do Editor

  1. Thank you. We are pleased to present the results of this market research which had some very interesting results.
  2. And if I can summarize what we found in one sentence, it it was that there is a huge gulf between IT managers’ expectations and reality. I’ll share the details with you in just a minute.
  3. The study was primarily designed to explore this issue of collaboration. You can see various types of security products listed on this slide, from various different vendors. [CLICK TO ADVANCE] These logos are representative of the products in each category. How many of these products are talking with one another? We wanted to find out because we think it is and important issue. And it is not just ForeScout who thinks it is important.
  4. Gartner also thinks it is important. About a year ago, they came out with a security model that they call the Adaptive Security Architecture. They recommend that every enterprises have twelve different categories of security capability. Going around this chart in a clockwise direction, you can see that some of the capabilities are intended to help predict whether your organization is going to be attacked, some will help you prevent a security breach, some will help you detect a security breach, and some will help you respond to a security breach. Different categories of products, somewhat like I showed you on the last slide. But Gartner said that the end result should not be 12 silos of disparate information security solutions. The end goal should be that these different capabilities integrate and share information to build a security protection system that is more adaptive and intelligent overall.
  5. So ForeScout worked with SC Magazine to conduct a market study, and we surveyed 345 corporate executives and consultants in North America. OK, so let’s get into it. What did we find out?
  6. The first question that we asked was: How many IT security systems do you own? And the answer was quite a few. Over half of the large enterprises, which we defined as organizations with over $1 billion in annual revenue, said that they had 13 or more security systems.
  7. Then we asked – how many of your IT security systems share information with each other? The majority of respondents said very few, just 1 to 3 systems directly shared security information.
  8. Then we asked: “How many of Your IT Security Systems Can Automatically Mitigate Risk Or Remediate Problems?” Again, the majority of respondents said between 1 and 3 of their existing systems could do this.
  9. So next we wanted to find out how important IT security managers believe that information sharing would be. It’s one thing for ForeScout and Gartner to say it is helpful, but we wanted to hear from customers. So we asked the question. Here we found a huge percentage – 95% of respondents said that it would be helpful or very helpful.
  10. We asked the same question about automation. Again we found a huge percentage – 93% of large enterprise customers said that it would be helpful or very helpful.
  11. So let me summarize the results so far. We found a huge gap between the current state and the desired state. Few systems are sharing information, and few systems can initiate automated risk mitigation actions, despite the fact that this is exactly what enterprise IT managers what to happen.
  12. Now let me move on and present some other results of the survey. We asked respondents: “why is more IT security system collaboration helpful?” We received a variety of rsponses. 97% said that more integrated controls would help identify, investigate, respond and resolve security incidents.
  13. 57% said that Automated security controls would have allowed the organization to avoid a compromise or reduce the impact of the compromise that they experienced in the last year
  14. And 75% said that more automation would help prevent future compromise. These answers were not mutually exclusive, which is why the totals add up to more than 100%. We wanted to get reactions to each of these statements.
  15. 43% or respondents said that their security processes are continous
  16. 64% said that they were planning to shift towards continuous monitoring in the next 12 to 24 months.
  17. So those were the major conclusions of the market study. TO summarize: We found that IT security managers strongly want their products to share information, but few do.
  18. We found that IT security managers want automated controls, but few products can do this.
  19. And we found that with respect to continuous monitoring and mitigation, slightly less than half of the organizations were practicing this today, but most organizations were planning to do this in the future.
  20. And we found a large gap between desire and reality.