SHARE
Facebook X Pinterest WhatsApp

In the Land of the Security Blind

When it comes to data security, most IT organizations don’t have a handle on how often and to what extent their data is compromised. A recent survey of 1,176 IT professionals conducted by the market research firm Securosis on behalf of Imperva, a provider of a range of data security technologies, found that the vast […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Oct 15, 2010

When it comes to data security, most IT organizations don’t have a handle on how often and to what extent their data is compromised.

A recent survey of 1,176 IT professionals conducted by the market research firm Securosis on behalf of Imperva, a provider of a range of data security technologies, found that the vast majority did not know how many times they may have experienced a major attack either eternally or internally, nor did they know what type of data had been stolen.

According to Imperva CTO Amichai Schulman, most IT organizations are not very effective in assessing the scope of the damage incurred by a security breach even when they are aware of the breach. And as the number of these breaches increases along with attacks aimed at the application layer, too many IT organizations are still overly dependent on a single line of defense at the security perimeter.

This situation not only makes it hard to justify security budgets, it frequently means that IT organizations during tough times are making hard choices in how to apply those budgets. Although applications are increasingly the primary point of attack, fear and inertia result in most of the IT security budget being spent on defending the network perimeter.

The Securosis survey shows that most IT professionals believe that most of the security technology they acquire is effective to one degree or another. It also shows that USB media encryption and data loss prevention technologies are at the top of the IT shopping list. In addition, the survey finds that the most effective security controls are full-drive encryption, access management tools, e-mail filtering and data loss prevention systems on the network. Survey participants also identified e-mail filtering and USB media encryption as the top two least effective security controls.

In the meantime, Schulman notes that the people launching these attacks are becoming more sophisticated by the day thanks to the influx of funding from organized crime syndicates. The end result is that IT organizations are increasingly outgunned when it comes to security.

Therefore, the challenge going forward, says Schulman, is figuring out how to size the appropriate level of security to the value of the data threatened. Unfortunately, many IT organizations don’t have a handle on the value of any given piece of data because they tend to manage all data as if it were of equal value. And until that situation changes, it’s only a matter of time before something bad happens that the IT organization may or may not know anything about.

In the Land of the Security Blind - slide 1

Click through for IT security survey results from Securosis.

In the Land of the Security Blind - slide 2

There is no correlation between the number of data centers and the size of the IT staff.

In the Land of the Security Blind - slide 3

The majority have no idea.

In the Land of the Security Blind - slide 4

The same goes for internal breaches.

In the Land of the Security Blind - slide 5

Again, ignorance appears to be bliss.

In the Land of the Security Blind - slide 6

Most appear to be staying even when it comes to security.

In the Land of the Security Blind - slide 7

When used, most security technologies have a positive impact.

In the Land of the Security Blind - slide 8

And things would be much worse without them.

In the Land of the Security Blind - slide 9

Opinions lean toward the positive.

In the Land of the Security Blind - slide 10

Access management tops the list.

In the Land of the Security Blind - slide 11

Email filtering and USB drive encryption top the list.

In the Land of the Security Blind - slide 12

Email filtering and access management are the most generally deployed.

In the Land of the Security Blind - slide 13

Security technology experience runs deep.

In the Land of the Security Blind - slide 14

Portable media encryption and data loss prevention lead the charge.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.