Thanks to you, the audience at UltimateWindowsSecurity, for the 2014 Survey. It was a great success with over 600 respondents! I appreciate all of you who took the time give me your thoughts.
You’ve provided some great ideas for real training for free™ in the coming year and I’ve learned which topics are most important to you. That’s going to benefit all of us.
In this presentation, we'll present our findings. We’ll talk about the community’s top goals for 2014, which topics you recommended I cover in 2014 and what our community sees as the greatest security concerns for 2014. And we’ll discuss other trends emerging from the data.
Find out about the top trends, such as:
SIEM – What are the top SIEM solutions? What is the UWS community’s top 3 biggest challenges with log/monitoring/security analytics?
Endpoint Security – How widely is application whitelisting being used and what is driving its adoption? Which endpoint security technologies really work and which are just hype?
Mobile Devices – Are employee owned mobile devices supported at your organization? Is your biggest concern with mobile devices malware, data loss, compliance?
The Cloud – How widely are your peers embracing the cloud? Is your organization’s security policy, technology and training keeping up with the move to the cloud?
Advanced Security Topics – What are your peers doing about “big data”? What about endpoints as sensors, and other new security approaches?
This will be a fact-filled and fascinating presentation on where we are and where we are going on a host of different security fronts. Don’t miss it.
3. Who are we?
SIEM/Monitoring
Top priorities 2014
Top risks 2014
Preview of Key
Points
Webinar topics for 2014
Application control
Virtualization
Cloud
Mobile
Future
4. 1 to 9
5.2%
10 to 49
6.4%
50 to 99
5.5%
5,000+
33.2%
What’s your
size?
100 to 499
16.1%
500 to 999
8.9%
2,000 to 4,999
13.0%
1,000 to 1,999
11.7%
5. Industry
Financial Services
High Technology
Professional Services
Healthcare
Public Sector (State & Local Government)
Education and Research
Public Sector (Federal Government)
Aerospace & Defense
Communications
Industrial Manufacturing
Retail
Utilities
Media and Entertainment
Travel & Transportation
Consumer Goods
Oil & Gas
Engineering and Construction
Automotive
Chemicals
Natural Resources
0.0%
5.0%
10.0%
15.0%
20.0%
25.0%
7. 4.4%
North America (US and
Canada)
15.2%
Americas (outside NA)
Where are
you?
4.1%
United Kingdom
2.4%
EMEA (Europe, Middle
East, Africa)
73.8%
APAC (Asia Pacific)
9. Logging
Event forwarding
Event correlation
Applications
Webinar topics
for 2014
SQL
Exchange
SharePoint
More
Linux/Unix
Cloud audit logging
VMWare
APTs
Prevention
Detection
Endpoint
BitLocker vs other solutions
Monitoring endpoints
Mobile security
Virtualization security
Data protection
10. Compliance
Monitoring
Client Security
Top Priorities
for 2014
0%
0%
1%1%
3% 1%
3%
3%
3%
3%
4%
Business
15%
Misc IT
Misc Security
Network Security
13%
4%
Patch mgt
Data Loss Prevention
4%
Vulnerability Management
11%
4%
4%
5%
6%
10%
IAM and Authentication
Awareness
Virtualization
Quantified Risks
Training
Cloud
11. Winner: Malware
Sophistication
Desktop/Laptop
Mobile device
Runners up
Greatest Risks
for 2014
Application vulnerabilities
Data security in the cloud
OS vulnerabilities
Spear Phishing attacks
Other
End-user security awareness
Data loss/leakage
Insider
APT
IAM
Rights
Privileged accounts
OTHER
DDOS ATTACKS
MAN-IN-THE-MIDDLE OR OTHER
BROWSER ATTACKS
MALWARE VIA MOBILE DEVICES
(E.G., SMARTPHONES, TABLETS)
SPEAR PHISHING ATTACKS
6.1%
15.0%
19.8%
33.5%
35.4%
OS VULNERABILITIES
36.9%
DATA SECURITY IN THE CLOUD
37.1%
APPLICATION VULNERABILITIES
42.7%
MALWARE VIA ENDPOINT
(E.G., DESKTOP, LAPTOP)
46.5%
MALWARE SOPHISTICATION
46.9%
12. What do you currently/plan to virtualize?
100%
90%
80%
70%
60%
Virtualization
50%
40%
30%
20%
10%
0%
Servers
Endpoints
Applications
Mobile
Other
No Plans
4.62%
39.83%
31.89%
70.71%
90.04%
Plan to Deploy
5.05%
23.09%
21.21%
13.85%
5.34%
Currently Deployed
90.33%
37.09%
46.90%
15.44%
4.62%
13. Perceived effectiveness of security technologies
Other
Mobile device management (MDM)
Personal firewalls
Application
Control
Application control (whitelisting)
Endpoint data loss prevention (DLP)
Anti-spyware
Host-based intrusion prevention
Port and device control
Anti-malware
Vulnerability assessment
Full-disk and file encryption
(mobile data protection)
50
55
60
65
70
75
17. Is your organization moving towards adopting clouddelivered applications?
Cloud usage
18. For those moving to the cloud, is security keeping up?
Cloud usage
19. We asked about personal and business cloud usage in the organization …
Do you allow personal cloud
applications on your
endpoints?
Cloud Usage
Do you have policies
restricting data being
moved to and from the
personal cloud?
Do you have enforcement
mechanisms managing data
being moved to and from
the personal cloud?
Does your organization
have a business cloud for
data storage and exchange
of files?
Yes (37.3%)
Yes
(51.8%)
No (62.7%)
No
(48.2
%)
No (81.1%)
Yes (39.2%)
No (60.8%)
20. What metrics does your management measure you on?
Metrics
(alt. view)
other
21. We asked several questions about where endpoint security was headed …
Changing
Security
Paradigms
22. Security analytics is here to stay at UWS
Mobile, APT, Malware and Data Loss are foremost on the risk radar
Endpoint security is a common denominator for all of them
Bottom line
Endpoint security more important than ever
Mobile device trend reinforces this
Cloud trend is limited and does not change this
Virtualization of endpoints and application delivery is a complementary
issue
What’s happening at endpoint security leader Lumension?