Security Breaches Just a Matter of Time

 
 
By Michael Vizard  |  Posted 01-08-2014 Email Print this article Print
 
 
 
 
 
 
 
 

A new survey finds that 54 percent of IT organizations say they can prove their internal security controls are effective, but 51 percent concede it's just a matter of time before the next security breach occurs. A new survey 400 IT decision-makers in the U.S. and U.K. that work at organizations with more than 500 employees conducted by Loudhouse on behalf of SailPoint Technologies, a provider of data governance and identity management tools, finds that just over half also admit to being aware that their security has been breached. And just to make matters more interesting, the vast majority admits to having very little control over the use of personal devices in the enterprise. Most respondents also need to figure out how to apply identity access management (IAM) policies to cloud applications. Unfortunately, the survey finds there is much to be desired in terms of IAM usage in the enterprise as many CIOs are feeling more vulnerable than ever. Yet, 88 percent of those surveyed say IAM is important to their organization.

 
 
 
  • Victims of a Security Breach

    Many businesses have experienced a security breach or expect one to occur., Just over half either admit or are aware their security has been breached: 53%, Admit employees have seen documents they shouldn't: 52%, Admit it is “just a matter of time” before another security breach occurs: 51%
    Victims of a Security Breach
  • The Importance of IAM

    Businesses recognize the benefits and value of IAM. Believe identity access management (IAM) is important to their organization overall: 88%, IAM is “critical" in helping businesses meet their compliance requirements: 54%, IAM reduces operational risk: 53%, Enables new business initiatives: 40%
    The Importance of IAM
  • Primary Focus of IAM Strategy

    For most, IAM is a task rather than strategic business initiative. Prevent security breaches and protect data: 49%, Achieve demonstrate compliance: 27%, Reduce operation and administration expense: 17%, Enable key business initiatives: 7%
    Primary Focus of IAM Strategy
  • IAM Challenges

    IAM leaves a lot to be desired in ways that tend to limit investments. Inability to get "big picture" across all systems and applications: 45%, Too reliant on IT support: 43%, Inability to manage new technologies: 40%, IAM tools have delivered poor ROI: 38%, Identity access management is too complex to use: 37%
    IAM Challenges
  • Confidence in Granting or Revoking Employee Access

    Just more than half say they are very confident in their access control mechanisms. Very confident: 54%, Somewhat confident: 35%, Not particularly confident: 10%, Not at all confident: 1%
    Confidence in Granting or Revoking Employee Access
  • The Mobile Computing Challenge

    Personal devices are widely used but not very well governed inside the enterprise. Allow employees the use of personal applications at work: 82%, Automatically remove mission-critical data from a device once an employee leaves: 41%, Regulate use of personal devices: 38%, Manually remove data from a device once an employee leaves: 35%, Admit data is left on personal devices: 6%
    The Mobile Computing Challenge
  • Cloud Application Mandates

    Despite cloud mandates, most IAM systems don't extend policies to software-as-a-service applications. Such a policy is already in place: 63%, No, but expect policy in next two years: 25%, No, but expect policy in next 12 months: 10%, No, but expect one beyond two years: 2%
    Cloud Application Mandates
  • Percentage of Mission-Critical Applications in the Cloud

    The cloud is rapidly becoming more strategic. Currently in the cloud: 39%, Expect to be in the cloud by 2016: 59%
    Percentage of Mission-Critical Applications in the Cloud
 
 
 
 
 
Mike Vizard has been covering IT issues in the enterprise for 25 years as an editor and columnist for publications such as InfoWorld, eWeek, Baseline, CRN, ComputerWorld and Digital Review.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date