Organizations struggling to keep pace with security needs: survey

1 Author : March 5, 2013 0

F5 Networks, Inc. has announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security.

Respondents were RSA attendees with IT responsibilities over planning, management, oversight, or implementation of security.

The results show that security trends such as virtualization (73pc), BYOD (66pc), and the complexity of attack types (72pc) have the greatest impact on securing today’s organizations. Nearly half of respondents admit that traditional safeguards are less than adequate in protecting against threats related to these trends, with roughly one-third of respondents reporting that their security readiness is inadequate.

Key Findings

Security is changing, from the type of threats to those  driving the threats.

When asked what security trends have the greatest impact on an organization’s ability to achieve the level of security it desires, respondents answered:

· Virtualization (73pc)

· The increasing complexity of threats (ex: Distributed Denial of Service attacks) (72pc)

· BYOD (use of employee-owned devices such as smartphones for business use) (66pc)

· The change in the bad guys (from hackers to espionage and political motivation) (62pc)

· The shift from data center focused infrastructure to cloud-based infrastructure (61pc)

· The shift from traditional client-server applications to web-based applications (60pc)

BYOD is seen as critical in an organization’s ability to achieve the level of security it desires, yet a sizeable number of organizations are not taking the appropriate steps to address it.

· Most (75pc) see BYOD as being prevalent in their organization.

· Furthermore, two-thirds (66pc) see BYOD as having a somewhat to extremely high impact on security.

· Despite this, one-third (35pc) say they are not prepared to provide adequate security to protect against threats associated with BYOD.

Organizations are unprepared to properly address the shift to web-based applications and cloud-based infrastructure.

· Nearly two-thirds (64pc) of respondents see the shift to web-based applications as a trend affecting security, yet 37 pc of respondents’ organizations are not providing adequate security to protect against potential threats.

· Sixty-six percent of respondents see the shift to cloud-based infrastructure as a trend affecting security, yet 49 pc of respondents’ organizations are not providing adequate security to protect against potential threats.

Threats are moving beyond the capability of traditional security safeguards.

There is a wide range of IT trends making security more complex. Below are the percentages of respondents who felt traditional safeguards were less than adequate in protecting against threats related to a variety of current IT trends:

· The shift from traditional client-server applications to web-based applications (44pc)

· The shift from data center focused infrastructure to cloud-based infrastructure (49pc)

· BYOD (use of employee-owned devices such as smartphones for business use) (45pc)

· Increased external threats (spam and malware) (39 pc)

· The increasing complexity of threats (ex: Distributed Denial of Service attacks) (48 pc)

· The change in the bad guys (from hackers to espionage and political motivation) (47 pc)

· Increasing insider threats (49 pc)

“The security landscape continues to change rapidly and many organizations are struggling to properly address evolving threats,” said Mark Vondemkamp, VP of Product Management for Security at F5.

“Companies will do well to proactively address trends like BYOD and cloud security, but they should also look to raise their game in terms of threat detection and mitigation. With employee behavior, business priorities, and infrastructure demands further expanding traditional threat vectors, the proper tools and procedures are essential in maintaining a healthy level of security.”

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.


+ 7 = twelve