By Ellen Messmer | 20 Jan 2012
A survey of 1,425 information technology managers in 32 countries about the type of security they deployed on their network endpoints, as well as security training for employees, indicates that these technology investments paid off in mitigating cyberattacks and downtime.
Those surveyed were asked to detail whether they made use of anti-malware, intrusion-prevention systems, data-loss prevention and firewall protection, plus whether they kept signatures updated on everything from physical desktops and servers to virtual desktops and servers, as well as laptops, notebooks and mobile devices.
The survey also asked how frequently cyberattacks against these endpoints happened over the course of the past 12 months, and in particular, which attacks were successful. A cyberattack was defined as an attack from inside or outside the organization that hit the network, website or physical and virtual computers and mobile devices. These might include viruses, spam, denial-of-service attacks, theft of information, fraud and vandalism.
The outcome, according to the 2012 Endpoint Security Best Practices Survey, conducted by Applied Research(www.a and sponsored by Symantec, shows the top-third tier of companies that had applied higher levels of security protection and employee training experienced two-and-half times fewer cyberattacks, and were three-and-a-half times less likely to experience downtime from them than companies in the lower tier with less applied security.
"We wanted take the pulse and find the correlations in this," says HormazdRomer, director of product marketing at Symantec, who says the survey did not inquire into what vendor products were specifically used but only category types. The companies participating in the survey hailed from manufacturing to high-tech to construction, the financial industry and the energy-production sector, as well as government.
The IT managers responding to the survey said their companies did suffer significant downtime remediating the fallout from cyberattacks. But there was a significant contrast in severity between the top-third tier that had the most security protections in place and the bottom third with far less.
This bottom third over the past 12 months suffered 2,765 hours in downtime, including 859 hours of downtime from cyberattacks that affected smartphones and tablets, 828 hours for desktops and notebooks, 241 hours for servers and 837 hours described simply as "widespread downtime." In contrast, the top-ranked third with the most identifiable security practices suffered a total of 588 hours in all these categories.
On average, the financial consequences of successful cyberattacks over the past 12 months cited by the survey respondents was significant, at an average of $470,000, mainly due to forced dedication of IT personnel to remediate affected endpoints as well as costs associated with loss of customer data and damage to the organization's brand and reputation.
Network World (US)
security Features and Opinions
By | 23 Mar 2012
Companies interested in moving to cloud computing are increasingly choosing a private cloud for the increased security and, often, compliance features instead of the public cloud, according to a recent survey.
This infographic by IDC shows how cloud is finally delivering on the hype as well as highlighting some key steps to ensuring successful cloud deployments.
By | 23 Mar 2012
A global research that explores small- to medium-sized businesses' (SMB) cloud services consumption and purchasing patterns finds that 66% of respondents said cloud-based services are very important to their business with 57% stating that their companies already take advantage of cloud-based services; 44% of those who are not yet using cloud-based services are actively considering it.
The worldwide public cloud services reached a total market size of $45.7 billion and is expects to grow at a CAGR of 23% until 2018, according to IDC. "(Our) Public Cloud Services Tracker shows very rapid growth in customer cloud service spending across 19 product categories and within eight geographic regions,” said Frank Gens, SVP and chief analyst at IDC.