Enterprises not confident in detecting security threats
Juniper Networks today announced the findings of a new Ponemon Institute report, which revealed that on average the security posture of Indian organizations surveyed is only 4.7 based on a scale of 10 in being very effective.
The Efficacy of Emerging Network Security Technologies study, commissioned globally by Juniper Networks, shows securing web traffic is by far the most significant network security concern for the majority of organizations (64 percent) surveyed. However, less than half (46 percent) of respondents agreed that emerging network security technologies are not as effective as they should be and do not minimize attacks that bring down web applications or block unwarranted Internet traffic.
This report uncovered key concerns and security threats that the 554 Indian IT and IT security professionals surveyed encounter in their companies on a daily basis, with theft of their organization’s intellectual property being one of the top security concerns that keeps them up at night.
Organizations believed that their emerging network technologies only partly addressed their security concerns where 63 percent of those surveyed said emerging network security technologies only addressed part of the security threats facing their organizations.
A majority of the respondents (55 percent) said that their organizations prioritized emerging network security technologies to curtail inside-out threats rather than a more holistic approach to security.
About 50 percent say blocking of IP addresses in not an effective security measure. Organizations are critical of their network security posture and rated them below average in detecting and preventing cyber-attacks. On an average, respondents said the security posture of their organization is only 4.7 out of 10 as being very effective. And 52 percent of the respondents said emerging network security technologies used by their organizations are dependent on the in-house personnel who possess the wherewithal to operate them effectively.
Respondents rated their organizations’ ability to quickly detect and prevent cyber-attacks as fair or 4.8 and 4.6, respectively, on a scale of 10 being excellent. The efficacy of emerging network security technologies is influenced by the complexities involved in configuring policies for Web Application Firewalls. Only half of the respondents said their organizations use emerging network security technologies to heighten visibility to applications and the use of cloud services.
Respondents surveyed did not deploy or are unsure about Web Application Firewalls (61 percent) (WAFs) because they think it might affect revenues as the high incidence of false positives may block legitimate customer traffic. A majority (79 percent) of the respondents said that is takes them at least a few weeks to configure and update rules or policies for WAF.
To effectively secure datacenters Juniper Networks said companies must have knowledge of the attacking devices, not just the IP address, and quickly disseminate that intelligence across the datacenter and into the network. Juniper said it can deliver this intelligence through its Junos Spotlight Secure global attacker intelligence service, which acts as the consolidation point for attacker and threat information, feeding real-time intelligence to Juniper’s security solutions. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks SRX Series Services Gateways.
“Security remains a major concern among organizations. The Ponemon Institute report reveals that even emerging network security technologies are not as effective as they should be. Companies need to review their security investment weighting, to assess whether the areas of greatest risk are receiving adequate attention and how they can address serious security threats,” said Ravi Chauhan, Managing Director, India and SAARC, Juniper Networks.
- Lack Of Trained Staff, Security Hinder FinTech Growth
- What’s Driving The Shift To Cryptocurrency Mining Malware?
- Why Enterprises Need To Automate Security Systems
- Ransomware Against IoT, Mobile On The Rise: SonicWall
- Employee Training: A Security Priority For Financial CISOs
- How To Become Cisco CCNA Security 210-260 Certified
- Women In Cybersecurity Face Harsh Reality: Study
- Decoding The Security Factor In IoT
- How Companies Can Disrupt Ransomware Attacks
- Weekly Rewind: Top 10 Stories On CXO Today (Oct 16-20)