SHARE
Facebook X Pinterest WhatsApp

Losing the War for IT Security

The gap between the sophistication of the attacks being launched against IT organizations and their ability to actually deal with those threats is widening. A new survey of 583 IT and security practitioners that was conducted by The Ponemon Institute on behalf of Juniper Networks finds that not only are the number of actual security […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 7, 2011

The gap between the sophistication of the attacks being launched against IT organizations and their ability to actually deal with those threats is widening.

A new survey of 583 IT and security practitioners that was conducted by The Ponemon Institute on behalf of Juniper Networks finds that not only are the number of actual security breaches increasing dramatically, IT organizations are losing confidence in their ability to deal with them.

Larry Ponemon, director of The Ponemon Institute, says the lack of confidence stems from three core issues facing IT today. The first is the rise of mobile computing, which is giving rise to more unprotected employee-owned devices being used to access corporate networks. The second is that as business processes continue to expand across the Internet, lax security at third-party business partners can easily lead to a security breach. And finally, the complexity of the overall IT environment makes it too hard to defend.

Karim Toubba, vice president of product marketing and strategy for the Security Business Unit at Juniper Networks, says the survey results show there is a clear need for a more holistic approach to security, which Juniper would argue needs to start at the network layer.

While vendors debate the merits of various approaches, it’s becoming increasingly clear that the IT security measures in place are not up to the task. They can typically defend against well-known, low-level attacks, but any targeted security attack has a reasonably high chance of being successful. The only thing that seems to be working to the advantage of many IT organizations is that there are so many potential targets, and hackers appear content to prey upon the weakest members of the enterprise IT herd.

Alas, that won’t be the case for much longer. We’ve already seen how corporations are now being targeted as part of a larger cyber war that crosses national boundaries. More often than not, the targets of those attacks are intellectual property in the hands of private corporations.

It may take a major international event that will push governments to require corporate entities to put more stringent security measures in place. But at the moment, it seems like IT organizations are being left to their own devices when it comes to defending their organizations from cyber criminals who appear to be getting more organized and sophisticated with each passing day.

Losing the War for IT Security - slide 1

Click through for results from a security survey conducted by Juniper Networks and the Ponemon Institute.

Losing the War for IT Security - slide 2

It’s becoming more common.

Losing the War for IT Security - slide 3

Most everybody is in the middle of the pack.

Losing the War for IT Security - slide 4

This is a rising concern.

Losing the War for IT Security - slide 5

Starting to really hurt.

Losing the War for IT Security - slide 6

Remote networks and third-party connections are the biggest issues.

Losing the War for IT Security - slide 7

Hard to fight what you can’t see.

Losing the War for IT Security - slide 8

Threats are everywhere.

Losing the War for IT Security - slide 9

Malware still dominates overall.

Losing the War for IT Security - slide 10

Mobile computing devices are easy to compromise.

Losing the War for IT Security - slide 11

Most do, despite security issues.

Losing the War for IT Security - slide 12

Complexity and available resources top the list.

Losing the War for IT Security - slide 13

A little more than half do.

Losing the War for IT Security - slide 14

Definitely heading in the wrong direction.

Losing the War for IT Security - slide 15

Web-based attacks followed by SQL Injections top the list.

Losing the War for IT Security - slide 16

Intellectual property is now the primary target.

Losing the War for IT Security - slide 17

Prevention is worth a pound of cure.

Losing the War for IT Security - slide 18

The end run around the firewall.

Losing the War for IT Security - slide 19

Most rely on the basics.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.