2013's Top Security Pain Points: Mobile, APTs, Third-Party Apps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2013's Top Security Pain Points: Mobile, APTs, Third-Party Apps-4 Next

Malware attacks are increasing. Fifty-eight percent of respondents say their organizations have more than 25 malware attempts or incidents each month and another 20 percent are unsure.

“It’s frightening that since we began this survey four years ago, the threatscape has expanded significantly and yet IT’s efforts in fighting malware and the tools they are using to do so remain consistently the same,” said Pat Clawson, Chairman and CEO, Lumension. “Clearly, IT is concerned but ill-equipped to deal with these issues. This may be due to lack of budget or lack of confidence in the tools they have at their disposal. We need to ensure that these issues are being raised to the C-suite, so that IT can secure the tools and funds they need to deal with this ever-growing challenge.”

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute and commissioned by Lumension to track endpoint risk, organizational threat strategy and resource availability. In this year’s State of the Endpoint Risk study, IT professionals reported the flood of mobile devices entering their corporate networks, advanced persistent threats and third-party application vulnerabilities are their primary pain points moving into 2013. A few short years ago, these concerns barely made the list.

“Once again, we found the changing security terrain is preventing the state of endpoint security from improving,” said Dr. Larry Ponemon, Chairman and Founder, the Ponemon Institute. “With the rise of hacktivism and advanced persistent threats, along with the sheer number of malware incidents we are seeing today, IT simply cannot keep up with the bad guys. Add to this fact that end users are furthering the complexity of the IT environment by bringing in mobile devices and downloading third-party applications - causing risk to exponentially proliferate. IT simply must take further action before the risk is beyond their control.”

The fourth annual State of Endpoint Risk study conducted by the Ponemon Institute and commissioned by Lumension reports major concerns over increasing security risks.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.