2013's Top Security Pain Points: Mobile, APTs, Third-Party Apps

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for findings from an endpoint security study conducted by the Ponemon Institute on behalf of Lumension.

Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing


The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute and commissioned by Lumension to track endpoint risk, organizational threat strategy and resource availability. In this year’s State of the Endpoint Risk study, IT professionals reported the flood of mobile devices entering their corporate networks, advanced persistent threats and third-party application vulnerabilities are their primary pain points moving into 2013. A few short years ago, these concerns barely made the list.

“Once again, we found the changing security terrain is preventing the state of endpoint security from improving,” said Dr. Larry Ponemon, Chairman and Founder, the Ponemon Institute. “With the rise of hacktivism and advanced persistent threats, along with the sheer number of malware incidents we are seeing today, IT simply cannot keep up with the bad guys. Add to this fact that end users are furthering the complexity of the IT environment by bringing in mobile devices and downloading third-party applications - causing risk to exponentially proliferate. IT simply must take further action before the risk is beyond their control.”

The fourth annual State of Endpoint Risk study conducted by the Ponemon Institute and commissioned by Lumension reports major concerns over increasing security risks.

 

More Slideshows

infra21-190x128 What International Conferencing Trends Tell Us About the World

The conference call is a common business practice across the globe. But can conferencing usage help us learn about cultural trends? ...  More >>

Social5-290x195 Four Ways to Unlock Value from the Internet of Things

IoT examples can be categorized into four basic usage scenarios, each of which presents clear business opportunities for end-user organizations. ...  More >>

Analytics7-290x195 Six Big Business Intelligence Mistakes

If you are planning a BI investment in the near future, here are six common mistakes that you need to avoid to ensure your investment is an effective one. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.