SlideShare uma empresa Scribd logo
1 de 29
The Fiction Behind IT Security Confidence 
A SolarWinds IT Industry Survey 
© 2014 SOLARWINDS WORLDWIDE, LLC. ALL 
RIGHTS RESERVED.
Introductions 
» This presentation is recorded and will be made available after the session. 
» Why did SolarWinds commission this research? 
» Why Enterprise Management Associates? 
Today’s Presenters: 
David Monahan 
Research Director, 
Security and Risk Management 
Enterprise Management Associates, Inc. 
e-mail: dmonahan@enterprisemanagement.com 
Follow me on Twitter: @SecurityMonahan 
© 2014 SOLARWINDS WORLDWIDE, LLC. ALL 
RIGHTS RESERVED. 
Mav Turner 
Director of Product Marketing, 
Security Products 
SolarWinds Worldwide, LLC 
e-mail: mav.turner@solarwinds.com 
Follow me on Twitter: @mavturner
Agenda 
Why is this important to you 
What you will learn- 
 How secure companies believe they are 
 Why the sense of security might be misplaced 
 Security posture perception deltas- Sr. Mgmt. vs. Practitioners 
 IT professionals take on requirements to improve security 
 How best practices fit in to the IT security strategy 
Slide 3 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc.
Demographics 
34% 
Slide 4 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
34% 
27% 
40% 
35% 
24% 
41% 
35% 
29% 
36% 
19% 
47% 
0% 10% 20% 30% 40% 50% 
Network 
Security 
Systems 
North America European Union (EU) Director and Above Manager and Below 
 Over 600 respondents surveyed in October 2014 
 NA, UK and DE Represented 
 Network, Security & Systems admins & Management 
 Organizations from 250 to 9,999 people 
 Revenue from <$1M US to >$1B US
Annual Sales Revenue by Region 
1% 
5% 
Slide 5 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
1% 
7% 
15% 
28% 
30% 
14% 
2% 
3% 
15% 
34% 
31% 
8% 
1% 
5% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 
Less than $1 Million 
$1 Million to under $5 Million 
$5 Million to under $20 Million 
$20 Million to under $100 Million 
$100 Million to under $1 Billion 
$1 Billion or more 
Not applicable, I work for a government or 
non-profit agency 
Don't know 
North America European Union (EU) 
 Overall company sales revenues were comparable 
 This was a surprise since the EU organizations had fewer people 
 We contacted more directors and above in the larger revenue organizations, 
$100M-$1B+ which was a little surprising
Security Budget Allocations (As a Portion of Overall IT Budgets) 
5% 
Slide 6 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
13% 
24% 
27% 
15% 
11% 
5% 
1% 
4% 
12% 
26% 
25% 
16% 
8% 
4% 
4% 
0% 5% 10% 15% 20% 25% 30% 
Less than 5% 
5% thru 9% 
10% thru 14% 
15% thru 19% 
19% thru 24% 
25% thru 29% 
30% or more% 
Dont know 
Director and Above Manager and Below 
 Overall the perception of budgets were consistent by role (and by geography) 
 Budgets were healthy and have been on a generally increasing trend
Security Budget Increases 
Slide 7 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
10% 
32% 
32% 
23% 
7% 
28% 
30% 
31% 
7% 
32% 
35% 
25% 
9% 
28% 
29% 
29% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 
Increased more than 25% 
Increased between 10% and 25% 
Increased less than 10% 
Stayed the same 
North America European Union (EU) Director and Above Manager and Below 
 NA Security Budgets have increased more than EU 
 Most likely due to increasing breaches in the past year. 
 Over 1900 breaches with 904M Records
Research Results- 
Perceptions by Role 
 Director and Above vs. Manager and Below 
Slide 8 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc.
Drivers for Purchasing Security Products 
Slide 9 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
20% 
20% 
23% 
19% 
18% 
21% 
18% 
26% 
21% 
15% 
0% 5% 10% 15% 20% 25% 30% 
Meeting compliance requirements 
Post security incident/breach/data loss 
Daily ops/monitoring 
Incident response 
Improve automation/Accommodate for lack of 
workforce or skillset 
Director and Above Manager and Below 
 Though fairly evenly split, Manager focused a little more on Operations delivery 
 In looking at the totals, people closer to the front lines look more at prevent and detect 
categories while upper mgmt. is more concerned with respond. 
 Surprising that though other questions bring out automation this question does not. 
 Appears that automation may be a more forward looking statement than a current 
issue 
 Remember that all of the companies that suffered major breaches involving payments 
were considered Compliant prior to their compromise. 
 Compliant is not Secure
Drivers for Purchasing Security Products 
Slide 10 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
13% 
24% 
19% 
18% 
27% 
21% 
16% 
24% 
19% 
19% 
0% 5% 10% 15% 20% 25% 30% 
Someone in the organization drove the selection 
or made a very strong recommendation 
To complete the purchase before a budget 
deadline 
It was needed to resolve an emergency/urgent 
outage/maintenance situation 
It was needed to resolve an emergency/urgent 
compliance situation 
It was needed to resolve an emergency/urgent 
security situation 
Director and Above Manager and Below 
 Managers were most motivated by either responding to an emergency situation or by 
spending budget before they lost it. 
 Dir. And above were primarily motivated by outages
Security Product Recommendations 
(outside of the work team) 
Slide 11 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
79% 
21% 
71% 
29% 
0% 20% 40% 60% 80% 100% 
Yes 
No 
Director and Above Manager and Below 
 More Sr. Mgmt recommend tools than Mangers and below. 
 This creates a problem, the people who are most removed from how the tools 
operate are most communicative. 
 Does this tell us that though ops gets the job done, they are not generally as happy with 
their tools?
Bringing “IT” with them 
Slide 12 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
69% 
31% 
61% 
39% 
0% 20% 40% 60% 80% 
Yes 
No 
Director and Above Manager and Below 
 Both Sr Mgmt. and Operations personnel are highly motivated to introduce their 
preciously successful tools into their new environments. This has several ramifications. 
 Operations personnel are in a better positon to do this, though they do it less 
 A tool that is great in one environment may not perform well in another. 
 Understanding requirements prior to importing a tool will reduce negative impacts.
Perception of Security Team and IT 
Interactions/Integrations 
Extremely close (Tightly integrated 
Slide 13 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
47% 
39% 
13% 
35% 
46% 
17% 
50% 
41% 
7% 
35% 
43% 
20% 
0% 10% 20% 30% 40% 50% 60% 
processes and operations) 
Very close (Groups interact freely 
with significant handoffs and 
integrations defined) 
Moderately close (Groups have 
operational/functional separation 
but work together on issues as 
needed) 
North America European Union (EU) Director and Above Manager and Below 
 NA vs. EU, EU seems to have a more realistic view. 
 Managers seem to be more in line with the overall EU perspective 
 The over perception of team integration provides a foundation for misperceptions
Do You have Enough Resources for Security 
Slide 14 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
86% 
13% 
83% 
15% 
87% 
12% 
81% 
16% 
0% 20% 40% 60% 80% 100% 
Yes 
No 
Director and Above Manager and Below North America European Union (EU) 
 Both Sr Mgmt. and Operations AND queried geographies indicate they have enough 
resources to maintain security for their organizations. 
 Why are breaches increasing in frequency and size? 
 Is this is a foundational perception flaw?
What is Most Helpful for Improving Security? 
Slide 15 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
57% 
43% 
57% 
43% 
0% 10% 20% 30% 40% 50% 60% 
Tools 
People 
Director and Above Manager and Below 
 People are not disposable but are needed for the more difficult tasks 
 Organizations that don’t have enough resources, tools most important: 
 Not enough people available 
 People are transient in a employee market 
 People don’t scale for efficiency and cost as well as automation
Following Best Practices 
Slide 16 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
21% 
24% 
11% 
23% 
11% 
10% 
0% 
17% 
21% 
15% 
19% 
11% 
15% 
2% 
0% 5% 10% 15% 20% 25% 30% 
We are certified. (ISO, CoBIT, PCI, HIPAA, SOX, etc.) 
We have most best practices defined and follow most 
of them. 
We have most best practices defined but they are not 
regularly followed. 
We have some key best practices defined and follow 
most of them. 
We have only a few key best practices defined but they 
are not generally followed. 
My org. has policies but I am not aware of any 
documented best practices. 
I am not aware of my org documenting any significant 
policies or best practices. 
Director and Above Manager and Below 
 Sr. Mgmt consistently rates themselves higher than the Mgrs. and below. 
 This identifies a disconnect between Sr. Mgmt. and other personnel. 
 This could be a driver as to why Sr. Mgmt. also consistently rated their 
security higher. 
 To be more secure many of these companies need to improve their 
documentation. (It often languishes.)
Attendee Poll: 
How Secure do You Think Your Organization is? 
 Extraordinarily secure- in the top 10th percentile 
 Superiorly secure- in the top 11th-20th percentile 
 Very secure- in the 21st-30th percentile 
 Averagely secure- in the 31st-75th percentile 
 We really need to work on it- in the bottom 76th- 
100th percentile 
© 2014 Enterprise Management © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Associates, Inc.
How Secure is your Organization? 
12% 
Slide 18 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
16% 
36% 
33% 
13% 
33% 
36% 
12% 
0% 10% 20% 30% 40% 
Extraordinarily secure- in the top 
10th percentile 
Superiorly secure- in the top 11th- 
20th percentile 
Very secure- in the 21st-30th 
percentile 
Averagely secure- in the 31st-60th 
percentile 
Director and Above Manager and Below 
 52% of Sr. Mgmt. believe their organizations are in the top 20th percentile! 
 85% believe they are in the 30th percentile 
 45% of Mgrs. and below believe their organizations are in the top 20th percentile! 
 81% believe they are in the 30th percentile 
 This identifies another disconnect between Sr. Mgmt. and other personnel. 
 Prides comes before the Fall
Attendee Poll: 
Do you think Is your Org is a Target for Attack? 
 Yes 
 No 
© 2014 Enterprise Management © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Associates, Inc.
Is your Org is a Target for Attackers? 
Slide 20 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
27% 
18% 
27% 
25% 
37% 
24% 
16% 
19% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 
No 
Yes, but we don't have/can't find enough skills or 
budget to address it or we have already or are in 
process of addressing it 
Yes and we are implementing a plan to address it as 
quickly as we can. 
Yes, but we feel we are at a low risk due to our controls 
already in place 
Director and Above Manager and Below 
 48% more Sr. Mgmt. have a higher perception than Mgrs. and below of where 
there organization is with implementing controls. 
 This identifies another disconnect between Sr. Mgmt. and other personnel. 
 Why do the Sr. Mgmt. believe that they have controls that they may not 
have? 
 This could be a driver as to why Sr. Mgmt. also consistently rated their 
security higher.
Who Experienced a Breach or Serious Attack 
Slide 21 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
66% 
34% 
68% 
31% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 
Yes, we experienced a significant attack or 
breach that we felt was significant enough 
that we reported it to law enforcement 
No, we have not experienced an attack or 
breach that we felt was significant enough to 
warrant reporting or external support 
Director and Above Manager and Below 
 The majority of respondents admit their org has been attacked/breached. 
 Breaches and significant attacks are a common occurrence! 
 How can we see the disparity between how secure respondents think they are vs 
how many have had serious incidents?
Breach Responsibility (Source/Blame) 
Slide 22 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
48% 
48% 
65% 
24% 
0% 10% 20% 30% 40% 50% 60% 70% 
IT Admin, Employee, End User 
CEO, CIO, Other Exec 
Director and Above Manager and Below 
 65% of Mgrs. That their peer group has been tagged as the source of breaches 
 This could represent a view of “persecution” on behalf of the Mgrs. and 
below. 
 Sr. Mgmt. feels their peer group is taking an even share of the responsibility. 
 Recent events such as Target® have most likely influenced this perception. 
 Since there are far fewer Sr. Mgmt. in the population, that could also 
indicate a feeling of “persecution” 
 This is supported by the fact that Sr. Mgmt. is providing more budgeting for 
security to provide greater protection.
How Long it Took to Discover a Breach / 
Incident? 
Slide 23 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
39% 
30% 
26% 
4% 
29% 
30% 
29% 
8% 
0% 10% 20% 30% 40% 50% 
<= 1 week 
1 week to 1 month 
1-3 Months 
4-6 months 
Director and Above Manager and Below 
 Mgrs. and below are a little more realistic but are still skewed 
 These responses vary considerably from Verizon® DBIR and Mandiant® Reports 
based on forensic research (median near 8 months) 
 Odds are that either these orgs. did not find the true entry date or they are going 
by an unsubstantiated gut feel.
Breach/Attack vs. Perception of Security 
Slide 24 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
73% 
27% 
73% 
27% 
76% 
24% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 
Yes, we experienced a significant attack or breach 
that we felt was significant enough to warrant 
reporting or external support 
No, we have not experienced an attack or breach 
that we felt was significant enough to warrant 
reporting or external support 
Extraordinarily secure- in the top 10th percentile Superiorly secure- in the top 11th-20th percentile 
We really need to work on it- in the bottom 76th-100th percentile 
 73% of the orgs that felt they were in the top 10th percentile have experienced a 
breach or significant attack! 
 73% of the orgs that felt they were in the top 20th percentile have experienced a 
breach! 
 Only 4% more companies that perceived themselves at the bottom of security 
experienced a breach or significant attack. 
 This could indicate a very poor incremental improvement or a serious over 
estimation of security.
Enough Resources vs. Believing you are a Target 
Slide 25 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc. 
79% 
18% 
3% 
74% 
24% 
2% 
82% 
18% 
0% 
93% 
7% 
0% 
82% 
5% 
14% 
0% 20% 40% 60% 80% 100% 
Yes 
No 
Don't know 
Yes, but we don't have/can't find enough skills to address it 
Yes, but we don't have enough budget to address it 
Yes and we are implementing a plan to address it as quickly as we can. 
Yes, but we feel we are at a low risk due to our controls already in place 
I don't really know 
 93% of respondents who thought they were a target and had enough controls in 
place thought they had sufficient resources. That’s Good! 
 82% of respondents who thought they were a target and had a plan in place to 
address security thought they had sufficient resources. That’s Good! 
 82% of respondents who said they didn’t know if their org was a target for hackers 
said they thought they were secure. (Scary!) 
 79% of respondents that said they thought they were a target and cannot find enough 
skills to address it also answered that they had sufficient resources. (Schizophrenic?) 
 74% of respondents that said they thought they were a target and don’t have enough 
budget to address it also answered that they had sufficient resources. 
(Schizophrenic?)
Summary 
 How secure companies believe they are.. 
 Organizations as a whole are overrating their security postures by revenue 
size, geography and by role. 
 Why the sense of security might be misplaced 
 It is evident that though they feel their security is in the upper echelons and 
they have little of value, organizations of all sizes are targets and the majority 
have suffered major attacks or breaches 
 Security posture perception deltas- Sr. Mgmt. vs. Practitioners 
 Both Sr mgmt. and operations level personnel in organizations that have not 
been breached recognize that better tools are required more than people to 
get better scale and results 
 Many organizations seem to have a lack of or inferior tools. SIEM is one tool 
that has not been well leveraged in many organizations, especially the 
smaller ones where cost is considered a barrier to entry. 
Slide 26 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc.
Summary 
 IT professionals take on requirements to improve security 
 Though many say they have sufficient resources they are getting breached 
 How best practices fit in to the IT security strategy 
 Lower Mgmt. is not getting the complete picture from upper management so 
they believe things are worse 
 Sr Mgmt. believes there is tighter alignment between security and other 
groups than there is. 
 Sr Mgmt. has a perception that policies, procedures and processes are 
better documented, distributed and followed than is happening in reality. 
 You need to have a strategy for addressing current and future 
needs 
 Identifying People, Process and Tools is key 
 Tools provide the best automation and organization continuity 
Slide 27 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 
© 2014 Enterprise Management Associates, Inc.
SolarWinds IT Management 
© 2014 SOLARWINDS WORLDWIDE, LLC. ALL 
RIGHTS RESERVED. 
Systems 
Management 
Incident & Problem 
Management 
Network Fault 
& 
Performance 
(NPM) 
Security 
Management 
Network 
Bandwidth & 
Traffic 
(NTA) 
VoIP 
Monitoring 
(VNQM) 
Help Desk 
(Web Help 
Desk®) 
Windows ® 
and 3rd Party 
Patching 
(SPM) 
Firewall Rules 
and Object 
Analysis 
(FSM) 
Server/ 
Application/ 
Database 
Monitoring 
(SAM, WPM, 
DPA) 
Virtualization 
Manager 
Storage 
Manager 
(STM) 
Log 
Monitoring & 
Event 
Correlation 
(LEM) 
Network 
Configuration 
Management 
(NCM) 
Network 
Performance Network 
Configuration 
IP Address 
Management 
/ Device 
Tracking 
(IPAM, UDT) 
Remote 
Administration 
(DameWare®, 
Mobile Admin®)
Thank you for attending 
today’s presentation 
For more information on Enterprise 
Management Associates and its services, 
please go to www.enterprisemanagement.com, 
or call +1 303-543-9500 
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark 
Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, 
registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may 
be or are trademarks or registered trademarks of their respective companies. 
© 2014 Enterprise Management Associates, Inc. 
© 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Mais conteúdo relacionado

Mais procurados

Human factors in major hazard safety Ronny Lardner
Human factors in major hazard safety  Ronny LardnerHuman factors in major hazard safety  Ronny Lardner
Human factors in major hazard safety Ronny LardnerNSW Environment and Planning
 
SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 

Mais procurados (6)

Human factors in major hazard safety Ronny Lardner
Human factors in major hazard safety  Ronny LardnerHuman factors in major hazard safety  Ronny Lardner
Human factors in major hazard safety Ronny Lardner
 
Newsroom
NewsroomNewsroom
Newsroom
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report SolarWinds MSP 2017 Cyber Security Report
SolarWinds MSP 2017 Cyber Security Report
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 

Destaque

Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)SolarWinds
 
Easy way to do rolling upgrades for SQL Server
Easy way to do rolling upgrades for SQL ServerEasy way to do rolling upgrades for SQL Server
Easy way to do rolling upgrades for SQL ServerSolarWinds
 
Why new hardware may not make SQL Server faster
Why new hardware may not make SQL Server fasterWhy new hardware may not make SQL Server faster
Why new hardware may not make SQL Server fasterSolarWinds
 
SolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New FeaturesSolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New FeaturesSolarWinds
 
The have no fear guide to virtualizing databases
The have no fear guide to virtualizing databasesThe have no fear guide to virtualizing databases
The have no fear guide to virtualizing databasesSolarWinds
 
How to fix IO problems for faster SQL Server performance
How to fix IO problems for faster SQL Server performanceHow to fix IO problems for faster SQL Server performance
How to fix IO problems for faster SQL Server performanceSolarWinds
 
Advanced tips for making Oracle databases faster
Advanced tips for making Oracle databases fasterAdvanced tips for making Oracle databases faster
Advanced tips for making Oracle databases fasterSolarWinds
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsSolarWinds
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationSolarWinds
 
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...SolarWinds
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds
 
SAM Webinar - Keep Your Web Apps Running Lean & Mean
SAM Webinar - Keep Your Web Apps Running Lean & Mean SAM Webinar - Keep Your Web Apps Running Lean & Mean
SAM Webinar - Keep Your Web Apps Running Lean & Mean SolarWinds
 
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)SolarWinds
 
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...SolarWinds
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)SolarWinds
 
Get High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceGet High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceSolarWinds
 
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds
 
Air Force Webinar: Using a SIEM to Improve Your IT Security
Air Force Webinar: Using a SIEM to Improve Your IT Security Air Force Webinar: Using a SIEM to Improve Your IT Security
Air Force Webinar: Using a SIEM to Improve Your IT Security SolarWinds
 
Survey: IT is Everywhere (End Users’ Perspective, Australia)
Survey: IT is Everywhere (End Users’ Perspective, Australia)Survey: IT is Everywhere (End Users’ Perspective, Australia)
Survey: IT is Everywhere (End Users’ Perspective, Australia)SolarWinds
 
Why SQL Server 2014 Cardinality Estimator is *the* killer feature
Why SQL Server 2014 Cardinality Estimator is *the* killer featureWhy SQL Server 2014 Cardinality Estimator is *the* killer feature
Why SQL Server 2014 Cardinality Estimator is *the* killer featureSolarWinds
 

Destaque (20)

Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)Survey: IT is Everywhere (End Users’ Perspective, UK)
Survey: IT is Everywhere (End Users’ Perspective, UK)
 
Easy way to do rolling upgrades for SQL Server
Easy way to do rolling upgrades for SQL ServerEasy way to do rolling upgrades for SQL Server
Easy way to do rolling upgrades for SQL Server
 
Why new hardware may not make SQL Server faster
Why new hardware may not make SQL Server fasterWhy new hardware may not make SQL Server faster
Why new hardware may not make SQL Server faster
 
SolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New FeaturesSolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New Features
 
The have no fear guide to virtualizing databases
The have no fear guide to virtualizing databasesThe have no fear guide to virtualizing databases
The have no fear guide to virtualizing databases
 
How to fix IO problems for faster SQL Server performance
How to fix IO problems for faster SQL Server performanceHow to fix IO problems for faster SQL Server performance
How to fix IO problems for faster SQL Server performance
 
Advanced tips for making Oracle databases faster
Advanced tips for making Oracle databases fasterAdvanced tips for making Oracle databases faster
Advanced tips for making Oracle databases faster
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT Consolidation
 
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...
SolarWinds Federal Tools Webinar - Using Integrated Tools to Improve Federal ...
 
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...
 
SAM Webinar - Keep Your Web Apps Running Lean & Mean
SAM Webinar - Keep Your Web Apps Running Lean & Mean SAM Webinar - Keep Your Web Apps Running Lean & Mean
SAM Webinar - Keep Your Web Apps Running Lean & Mean
 
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)Survey: IT is Everywhere (End Users’ Perspective, Singapore)
Survey: IT is Everywhere (End Users’ Perspective, Singapore)
 
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...
 
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
Survey: IT is Everywhere (End Users’ Perspective, Hong Kong)
 
Get High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter PerformanceGet High-Octane Virtual Datacenter Performance
Get High-Octane Virtual Datacenter Performance
 
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds OrionSolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
SolarWinds Federal User Group 2016 - Optimizing SolarWinds Orion
 
Air Force Webinar: Using a SIEM to Improve Your IT Security
Air Force Webinar: Using a SIEM to Improve Your IT Security Air Force Webinar: Using a SIEM to Improve Your IT Security
Air Force Webinar: Using a SIEM to Improve Your IT Security
 
Survey: IT is Everywhere (End Users’ Perspective, Australia)
Survey: IT is Everywhere (End Users’ Perspective, Australia)Survey: IT is Everywhere (End Users’ Perspective, Australia)
Survey: IT is Everywhere (End Users’ Perspective, Australia)
 
Why SQL Server 2014 Cardinality Estimator is *the* killer feature
Why SQL Server 2014 Cardinality Estimator is *the* killer featureWhy SQL Server 2014 Cardinality Estimator is *the* killer feature
Why SQL Server 2014 Cardinality Estimator is *the* killer feature
 

Semelhante a The Fiction behind IT Security Confidence

Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)SolarWinds
 
SolarWinds Federal Cybersecurity Survey 2015
SolarWinds Federal Cybersecurity Survey 2015SolarWinds Federal Cybersecurity Survey 2015
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)SolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2Stephanie Crates
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)SolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)SolarWinds
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)SolarWinds
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 

Semelhante a The Fiction behind IT Security Confidence (20)

Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Germany)
 
SolarWinds Federal Cybersecurity Survey 2015
SolarWinds Federal Cybersecurity Survey 2015SolarWinds Federal Cybersecurity Survey 2015
SolarWinds Federal Cybersecurity Survey 2015
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Australia)
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Brazil)
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (United Kingdom)
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (Singapore)
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
SaaS Data Protection
SaaS Data ProtectionSaaS Data Protection
SaaS Data Protection
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 

Mais de SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceSolarWinds
 

Mais de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

The Fiction behind IT Security Confidence

  • 1. The Fiction Behind IT Security Confidence A SolarWinds IT Industry Survey © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 2. Introductions » This presentation is recorded and will be made available after the session. » Why did SolarWinds commission this research? » Why Enterprise Management Associates? Today’s Presenters: David Monahan Research Director, Security and Risk Management Enterprise Management Associates, Inc. e-mail: dmonahan@enterprisemanagement.com Follow me on Twitter: @SecurityMonahan © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Mav Turner Director of Product Marketing, Security Products SolarWinds Worldwide, LLC e-mail: mav.turner@solarwinds.com Follow me on Twitter: @mavturner
  • 3. Agenda Why is this important to you What you will learn-  How secure companies believe they are  Why the sense of security might be misplaced  Security posture perception deltas- Sr. Mgmt. vs. Practitioners  IT professionals take on requirements to improve security  How best practices fit in to the IT security strategy Slide 3 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc.
  • 4. Demographics 34% Slide 4 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 34% 27% 40% 35% 24% 41% 35% 29% 36% 19% 47% 0% 10% 20% 30% 40% 50% Network Security Systems North America European Union (EU) Director and Above Manager and Below  Over 600 respondents surveyed in October 2014  NA, UK and DE Represented  Network, Security & Systems admins & Management  Organizations from 250 to 9,999 people  Revenue from <$1M US to >$1B US
  • 5. Annual Sales Revenue by Region 1% 5% Slide 5 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 1% 7% 15% 28% 30% 14% 2% 3% 15% 34% 31% 8% 1% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% Less than $1 Million $1 Million to under $5 Million $5 Million to under $20 Million $20 Million to under $100 Million $100 Million to under $1 Billion $1 Billion or more Not applicable, I work for a government or non-profit agency Don't know North America European Union (EU)  Overall company sales revenues were comparable  This was a surprise since the EU organizations had fewer people  We contacted more directors and above in the larger revenue organizations, $100M-$1B+ which was a little surprising
  • 6. Security Budget Allocations (As a Portion of Overall IT Budgets) 5% Slide 6 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 13% 24% 27% 15% 11% 5% 1% 4% 12% 26% 25% 16% 8% 4% 4% 0% 5% 10% 15% 20% 25% 30% Less than 5% 5% thru 9% 10% thru 14% 15% thru 19% 19% thru 24% 25% thru 29% 30% or more% Dont know Director and Above Manager and Below  Overall the perception of budgets were consistent by role (and by geography)  Budgets were healthy and have been on a generally increasing trend
  • 7. Security Budget Increases Slide 7 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 10% 32% 32% 23% 7% 28% 30% 31% 7% 32% 35% 25% 9% 28% 29% 29% 0% 5% 10% 15% 20% 25% 30% 35% 40% Increased more than 25% Increased between 10% and 25% Increased less than 10% Stayed the same North America European Union (EU) Director and Above Manager and Below  NA Security Budgets have increased more than EU  Most likely due to increasing breaches in the past year.  Over 1900 breaches with 904M Records
  • 8. Research Results- Perceptions by Role  Director and Above vs. Manager and Below Slide 8 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc.
  • 9. Drivers for Purchasing Security Products Slide 9 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 20% 20% 23% 19% 18% 21% 18% 26% 21% 15% 0% 5% 10% 15% 20% 25% 30% Meeting compliance requirements Post security incident/breach/data loss Daily ops/monitoring Incident response Improve automation/Accommodate for lack of workforce or skillset Director and Above Manager and Below  Though fairly evenly split, Manager focused a little more on Operations delivery  In looking at the totals, people closer to the front lines look more at prevent and detect categories while upper mgmt. is more concerned with respond.  Surprising that though other questions bring out automation this question does not.  Appears that automation may be a more forward looking statement than a current issue  Remember that all of the companies that suffered major breaches involving payments were considered Compliant prior to their compromise.  Compliant is not Secure
  • 10. Drivers for Purchasing Security Products Slide 10 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 13% 24% 19% 18% 27% 21% 16% 24% 19% 19% 0% 5% 10% 15% 20% 25% 30% Someone in the organization drove the selection or made a very strong recommendation To complete the purchase before a budget deadline It was needed to resolve an emergency/urgent outage/maintenance situation It was needed to resolve an emergency/urgent compliance situation It was needed to resolve an emergency/urgent security situation Director and Above Manager and Below  Managers were most motivated by either responding to an emergency situation or by spending budget before they lost it.  Dir. And above were primarily motivated by outages
  • 11. Security Product Recommendations (outside of the work team) Slide 11 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 79% 21% 71% 29% 0% 20% 40% 60% 80% 100% Yes No Director and Above Manager and Below  More Sr. Mgmt recommend tools than Mangers and below.  This creates a problem, the people who are most removed from how the tools operate are most communicative.  Does this tell us that though ops gets the job done, they are not generally as happy with their tools?
  • 12. Bringing “IT” with them Slide 12 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 69% 31% 61% 39% 0% 20% 40% 60% 80% Yes No Director and Above Manager and Below  Both Sr Mgmt. and Operations personnel are highly motivated to introduce their preciously successful tools into their new environments. This has several ramifications.  Operations personnel are in a better positon to do this, though they do it less  A tool that is great in one environment may not perform well in another.  Understanding requirements prior to importing a tool will reduce negative impacts.
  • 13. Perception of Security Team and IT Interactions/Integrations Extremely close (Tightly integrated Slide 13 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 47% 39% 13% 35% 46% 17% 50% 41% 7% 35% 43% 20% 0% 10% 20% 30% 40% 50% 60% processes and operations) Very close (Groups interact freely with significant handoffs and integrations defined) Moderately close (Groups have operational/functional separation but work together on issues as needed) North America European Union (EU) Director and Above Manager and Below  NA vs. EU, EU seems to have a more realistic view.  Managers seem to be more in line with the overall EU perspective  The over perception of team integration provides a foundation for misperceptions
  • 14. Do You have Enough Resources for Security Slide 14 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 86% 13% 83% 15% 87% 12% 81% 16% 0% 20% 40% 60% 80% 100% Yes No Director and Above Manager and Below North America European Union (EU)  Both Sr Mgmt. and Operations AND queried geographies indicate they have enough resources to maintain security for their organizations.  Why are breaches increasing in frequency and size?  Is this is a foundational perception flaw?
  • 15. What is Most Helpful for Improving Security? Slide 15 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 57% 43% 57% 43% 0% 10% 20% 30% 40% 50% 60% Tools People Director and Above Manager and Below  People are not disposable but are needed for the more difficult tasks  Organizations that don’t have enough resources, tools most important:  Not enough people available  People are transient in a employee market  People don’t scale for efficiency and cost as well as automation
  • 16. Following Best Practices Slide 16 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 21% 24% 11% 23% 11% 10% 0% 17% 21% 15% 19% 11% 15% 2% 0% 5% 10% 15% 20% 25% 30% We are certified. (ISO, CoBIT, PCI, HIPAA, SOX, etc.) We have most best practices defined and follow most of them. We have most best practices defined but they are not regularly followed. We have some key best practices defined and follow most of them. We have only a few key best practices defined but they are not generally followed. My org. has policies but I am not aware of any documented best practices. I am not aware of my org documenting any significant policies or best practices. Director and Above Manager and Below  Sr. Mgmt consistently rates themselves higher than the Mgrs. and below.  This identifies a disconnect between Sr. Mgmt. and other personnel.  This could be a driver as to why Sr. Mgmt. also consistently rated their security higher.  To be more secure many of these companies need to improve their documentation. (It often languishes.)
  • 17. Attendee Poll: How Secure do You Think Your Organization is?  Extraordinarily secure- in the top 10th percentile  Superiorly secure- in the top 11th-20th percentile  Very secure- in the 21st-30th percentile  Averagely secure- in the 31st-75th percentile  We really need to work on it- in the bottom 76th- 100th percentile © 2014 Enterprise Management © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Associates, Inc.
  • 18. How Secure is your Organization? 12% Slide 18 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 16% 36% 33% 13% 33% 36% 12% 0% 10% 20% 30% 40% Extraordinarily secure- in the top 10th percentile Superiorly secure- in the top 11th- 20th percentile Very secure- in the 21st-30th percentile Averagely secure- in the 31st-60th percentile Director and Above Manager and Below  52% of Sr. Mgmt. believe their organizations are in the top 20th percentile!  85% believe they are in the 30th percentile  45% of Mgrs. and below believe their organizations are in the top 20th percentile!  81% believe they are in the 30th percentile  This identifies another disconnect between Sr. Mgmt. and other personnel.  Prides comes before the Fall
  • 19. Attendee Poll: Do you think Is your Org is a Target for Attack?  Yes  No © 2014 Enterprise Management © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Associates, Inc.
  • 20. Is your Org is a Target for Attackers? Slide 20 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 27% 18% 27% 25% 37% 24% 16% 19% 0% 5% 10% 15% 20% 25% 30% 35% 40% No Yes, but we don't have/can't find enough skills or budget to address it or we have already or are in process of addressing it Yes and we are implementing a plan to address it as quickly as we can. Yes, but we feel we are at a low risk due to our controls already in place Director and Above Manager and Below  48% more Sr. Mgmt. have a higher perception than Mgrs. and below of where there organization is with implementing controls.  This identifies another disconnect between Sr. Mgmt. and other personnel.  Why do the Sr. Mgmt. believe that they have controls that they may not have?  This could be a driver as to why Sr. Mgmt. also consistently rated their security higher.
  • 21. Who Experienced a Breach or Serious Attack Slide 21 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 66% 34% 68% 31% 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes, we experienced a significant attack or breach that we felt was significant enough that we reported it to law enforcement No, we have not experienced an attack or breach that we felt was significant enough to warrant reporting or external support Director and Above Manager and Below  The majority of respondents admit their org has been attacked/breached.  Breaches and significant attacks are a common occurrence!  How can we see the disparity between how secure respondents think they are vs how many have had serious incidents?
  • 22. Breach Responsibility (Source/Blame) Slide 22 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 48% 48% 65% 24% 0% 10% 20% 30% 40% 50% 60% 70% IT Admin, Employee, End User CEO, CIO, Other Exec Director and Above Manager and Below  65% of Mgrs. That their peer group has been tagged as the source of breaches  This could represent a view of “persecution” on behalf of the Mgrs. and below.  Sr. Mgmt. feels their peer group is taking an even share of the responsibility.  Recent events such as Target® have most likely influenced this perception.  Since there are far fewer Sr. Mgmt. in the population, that could also indicate a feeling of “persecution”  This is supported by the fact that Sr. Mgmt. is providing more budgeting for security to provide greater protection.
  • 23. How Long it Took to Discover a Breach / Incident? Slide 23 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 39% 30% 26% 4% 29% 30% 29% 8% 0% 10% 20% 30% 40% 50% <= 1 week 1 week to 1 month 1-3 Months 4-6 months Director and Above Manager and Below  Mgrs. and below are a little more realistic but are still skewed  These responses vary considerably from Verizon® DBIR and Mandiant® Reports based on forensic research (median near 8 months)  Odds are that either these orgs. did not find the true entry date or they are going by an unsubstantiated gut feel.
  • 24. Breach/Attack vs. Perception of Security Slide 24 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 73% 27% 73% 27% 76% 24% 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes, we experienced a significant attack or breach that we felt was significant enough to warrant reporting or external support No, we have not experienced an attack or breach that we felt was significant enough to warrant reporting or external support Extraordinarily secure- in the top 10th percentile Superiorly secure- in the top 11th-20th percentile We really need to work on it- in the bottom 76th-100th percentile  73% of the orgs that felt they were in the top 10th percentile have experienced a breach or significant attack!  73% of the orgs that felt they were in the top 20th percentile have experienced a breach!  Only 4% more companies that perceived themselves at the bottom of security experienced a breach or significant attack.  This could indicate a very poor incremental improvement or a serious over estimation of security.
  • 25. Enough Resources vs. Believing you are a Target Slide 25 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc. 79% 18% 3% 74% 24% 2% 82% 18% 0% 93% 7% 0% 82% 5% 14% 0% 20% 40% 60% 80% 100% Yes No Don't know Yes, but we don't have/can't find enough skills to address it Yes, but we don't have enough budget to address it Yes and we are implementing a plan to address it as quickly as we can. Yes, but we feel we are at a low risk due to our controls already in place I don't really know  93% of respondents who thought they were a target and had enough controls in place thought they had sufficient resources. That’s Good!  82% of respondents who thought they were a target and had a plan in place to address security thought they had sufficient resources. That’s Good!  82% of respondents who said they didn’t know if their org was a target for hackers said they thought they were secure. (Scary!)  79% of respondents that said they thought they were a target and cannot find enough skills to address it also answered that they had sufficient resources. (Schizophrenic?)  74% of respondents that said they thought they were a target and don’t have enough budget to address it also answered that they had sufficient resources. (Schizophrenic?)
  • 26. Summary  How secure companies believe they are..  Organizations as a whole are overrating their security postures by revenue size, geography and by role.  Why the sense of security might be misplaced  It is evident that though they feel their security is in the upper echelons and they have little of value, organizations of all sizes are targets and the majority have suffered major attacks or breaches  Security posture perception deltas- Sr. Mgmt. vs. Practitioners  Both Sr mgmt. and operations level personnel in organizations that have not been breached recognize that better tools are required more than people to get better scale and results  Many organizations seem to have a lack of or inferior tools. SIEM is one tool that has not been well leveraged in many organizations, especially the smaller ones where cost is considered a barrier to entry. Slide 26 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc.
  • 27. Summary  IT professionals take on requirements to improve security  Though many say they have sufficient resources they are getting breached  How best practices fit in to the IT security strategy  Lower Mgmt. is not getting the complete picture from upper management so they believe things are worse  Sr Mgmt. believes there is tighter alignment between security and other groups than there is.  Sr Mgmt. has a perception that policies, procedures and processes are better documented, distributed and followed than is happening in reality.  You need to have a strategy for addressing current and future needs  Identifying People, Process and Tools is key  Tools provide the best automation and organization continuity Slide 27 © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. © 2014 Enterprise Management Associates, Inc.
  • 28. SolarWinds IT Management © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Systems Management Incident & Problem Management Network Fault & Performance (NPM) Security Management Network Bandwidth & Traffic (NTA) VoIP Monitoring (VNQM) Help Desk (Web Help Desk®) Windows ® and 3rd Party Patching (SPM) Firewall Rules and Object Analysis (FSM) Server/ Application/ Database Monitoring (SAM, WPM, DPA) Virtualization Manager Storage Manager (STM) Log Monitoring & Event Correlation (LEM) Network Configuration Management (NCM) Network Performance Network Configuration IP Address Management / Device Tracking (IPAM, UDT) Remote Administration (DameWare®, Mobile Admin®)
  • 29. Thank you for attending today’s presentation For more information on Enterprise Management Associates and its services, please go to www.enterprisemanagement.com, or call +1 303-543-9500 The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2014 Enterprise Management Associates, Inc. © 2014 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Notas do Editor

  1. David has over 20 years of IT security experience and has organized and managed both physical and information security programs, including Security and Network Operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse Audit and Compliance and Risk and Privacy experience – providing strategic and tactical leadership, developing, architecting and deploying assurance controls, delivering process and policy documentation and training, as well as other aspects associated with educational and technical solutions. Prior to joining Enterprise Management Associates (EMA), David spent almost 10 years at AT&T Solutions focused on the network security discipline.
  2. Over 600 respondents Organizations across NA, UK and DE Respondents composed of Network, Security and Systems administrators and direct management Company sizes from 250 to 9,999 people Revenue from <$1M US to >$1B US No significant differences between NA and EU respondents Mgrs. and below are more represented in Systems
  3. Situational drivers
  4. Buy without trying Mav wants to jump in here The identified motivations are understandable. The upper management often is not involved until pain is experienced for an outage so that is their primary perception. Mgrs. and below are trying to fight fires and resolve issues, not just outages, many of which upper management will not see if they are dealt with or contained in a timely manner
  5. Managers see the warts and may be less inclined to promote some tools while Sr. Mgmt. see the final product/results and equate that with the tool quality without necessarily knowing what had to be done outside the tool to achieve the result.
  6. This makes sense as they tend to control the budgets Operations personnel are in a better positon to do this, though they do it less, because they understand the environment better
  7. Mangers live the daily work so their perception of integrations and interaction should be closer to reality Sr. Mgmt is shielded from the rough edges or lack of integration by managers because all they see is the job getting done. Th e integrations are lower at the small company level but the personal relationships more than make up for it Larger organizations generally have better defined processes but they are not always tightly followed or well designed. Bureaucratic and other issues often get in the way of smoothly executing
  8. How can it be that organizations across the board by both role and geography are saying they have sufficient resources and yet breaches are increasing in frequency and size!?
  9. Sample Size = 91
  10. Upper management seems to be overly confident in their certification levels and best practices leading to their over estimation of security
  11. Respondents consistently think they are more secure than they are
  12. Dir and above have a significantly higher perception of their security than the Mgrs. and below Mgrs. and below are either not doing a good job of communicating the real situation or upper mgmt has a significant bravado issue
  13. 68% Mgrs. and below indicated they had had some form of significant breach 66% of Directors and above indicated they had had some form of significant breach
  14. If there are fewer Sr. Mgmt. taking an equal share of the blame for breaches then the Sr. Mgmt has a higher percentage of their population taking the blame for breaches. 50 breaches divided equally in to are 25 for each group. There are 100 in the Mgr and below group and 25 Sr. Mgmt. That would equal 25% of the Mgrs and below but 100% of the Sr. Mgmt. Sample Size = 401
  15. Mav wants to jump in here Front line people recognize it takes longer to discover. Managers tend to under report. These are significantly lower than research from the forensics guys 8 months median and 76 months longest Sample Size = 401
  16. How can 73% of respondents indicate that they believe they are in the top 10% of security and also indicate that they have had a significant attack or breach that warranted external support?
  17. 93% of respondents who thought they were a target but had enough controls in place thought they had sufficient resources. That’s Good! 82% of respondents who thought they were a target and had a plan in place to address security thought they had sufficient resources. That’s Good! Paradox- These people should know but come across as schizophrenic 82% of respondents who said they didn’t know if their org was a target for hackers said they thought they were secure 79% of respondents that said they thought they were a target and cannot find enough skills to address it also answered that they had sufficient resources 74% of respondents that said they thought they were a target and don’t have enough budget to address it also answered that they had sufficient resources