SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
2014 Security Trends: SIEM,
Endpoint Security, Data Loss,
Mobile Devices and the Cloud

© 2013 Monterey Technology Group Inc.

Sponsored by
Thanks to

© 2013 Monterey Technology Group Inc.

www.Lumension.com
 Who are we?
 SIEM/Monitoring
 Top priorities 2014
 Top risks 2014

Preview of Key
Points

 Webinar topics for 2014

 Application control
 Virtualization
 Cloud
 Mobile
 Future
1 to 9
5.2%

10 to 49
6.4%

50 to 99
5.5%

5,000+
33.2%

What’s your
size?

100 to 499
16.1%

500 to 999
8.9%

2,000 to 4,999
13.0%
1,000 to 1,999
11.7%
Industry

Financial Services
High Technology
Professional Services
Healthcare
Public Sector (State & Local Government)
Education and Research
Public Sector (Federal Government)
Aerospace & Defense
Communications
Industrial Manufacturing
Retail
Utilities
Media and Entertainment
Travel & Transportation
Consumer Goods
Oil & Gas
Engineering and Construction
Automotive
Chemicals
Natural Resources
0.0%

5.0%

10.0%

15.0%

20.0%

25.0%
7%

Who are you?

26%

Technical
Manager / Director
VP and above

67%
4.4%

North America (US and
Canada)

15.2%

Americas (outside NA)

Where are
you?

4.1%
United Kingdom

2.4%

EMEA (Europe, Middle
East, Africa)

73.8%

APAC (Asia Pacific)
Biggest
challenge with
SIEM?

3%4%

16%

Resources

18%

Analysis
Volume
Cooperation

5%

Technology Management

17%

37%

Realtime
SIEM Product
 Logging
 Event forwarding
 Event correlation
 Applications





Webinar topics
for 2014

SQL
Exchange
SharePoint
More

 Linux/Unix
 Cloud audit logging
 VMWare

 APTs
 Prevention
 Detection

 Endpoint
 BitLocker vs other solutions
 Monitoring endpoints

 Mobile security
 Virtualization security
 Data protection
Compliance
Monitoring
Client Security

Top Priorities
for 2014

0%
0%
1%1%
3% 1%
3%
3%
3%
3%
4%

Business

15%

Misc IT
Misc Security

Network Security

13%

4%

Patch mgt
Data Loss Prevention

4%

Vulnerability Management

11%

4%
4%
5%

6%

10%

IAM and Authentication
Awareness
Virtualization
Quantified Risks
Training
Cloud
 Winner: Malware
 Sophistication
 Desktop/Laptop
 Mobile device

 Runners up

Greatest Risks
for 2014






Application vulnerabilities
Data security in the cloud
OS vulnerabilities
Spear Phishing attacks

 Other
 End-user security awareness
 Data loss/leakage
 Insider

 APT
 IAM
 Rights
 Privileged accounts

OTHER
DDOS ATTACKS
MAN-IN-THE-MIDDLE OR OTHER
BROWSER ATTACKS
MALWARE VIA MOBILE DEVICES
(E.G., SMARTPHONES, TABLETS)
SPEAR PHISHING ATTACKS

6.1%

15.0%
19.8%
33.5%
35.4%

OS VULNERABILITIES

36.9%

DATA SECURITY IN THE CLOUD

37.1%

APPLICATION VULNERABILITIES

42.7%

MALWARE VIA ENDPOINT
(E.G., DESKTOP, LAPTOP)

46.5%

MALWARE SOPHISTICATION

46.9%
 What do you currently/plan to virtualize?
100%
90%

80%
70%
60%

Virtualization

50%
40%

30%
20%
10%
0%

Servers

Endpoints

Applications

Mobile

Other

No Plans

4.62%

39.83%

31.89%

70.71%

90.04%

Plan to Deploy

5.05%

23.09%

21.21%

13.85%

5.34%

Currently Deployed

90.33%

37.09%

46.90%

15.44%

4.62%
Perceived effectiveness of security technologies

Other
Mobile device management (MDM)
Personal firewalls

Application
Control

Application control (whitelisting)
Endpoint data loss prevention (DLP)
Anti-spyware
Host-based intrusion prevention
Port and device control
Anti-malware
Vulnerability assessment
Full-disk and file encryption
(mobile data protection)
50

55

60

65

70

75
Perceived effectiveness of whitelisting between current/planned/non-users

Application
Control
6%

Mobile
Devices

9%

Employee-Owned Only

27%

Corporate-Owned Only
Mix
None

58%
Biggest concern regarding mobile devices

Mobile
Devices
Is your organization moving towards adopting clouddelivered applications?

Cloud usage
For those moving to the cloud, is security keeping up?

Cloud usage
We asked about personal and business cloud usage in the organization …

Do you allow personal cloud
applications on your
endpoints?

Cloud Usage

Do you have policies
restricting data being
moved to and from the
personal cloud?

Do you have enforcement
mechanisms managing data
being moved to and from
the personal cloud?
Does your organization
have a business cloud for
data storage and exchange
of files?

Yes (37.3%)

Yes
(51.8%)

No (62.7%)

No
(48.2
%)

No (81.1%)

Yes (39.2%)

No (60.8%)
What metrics does your management measure you on?

Metrics
(alt. view)
other
We asked several questions about where endpoint security was headed …

Changing
Security
Paradigms
 Security analytics is here to stay at UWS
 Mobile, APT, Malware and Data Loss are foremost on the risk radar
 Endpoint security is a common denominator for all of them

Bottom line

 Endpoint security more important than ever
 Mobile device trend reinforces this
 Cloud trend is limited and does not change this
 Virtualization of endpoints and application delivery is a complementary
issue

 What’s happening at endpoint security leader Lumension?
Additional
Information

www.lumension.com/endpoint-management-security-suite/buy-now.aspx

Contenu connexe

Tendances

CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilitySymantec
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Nonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansNonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansCatalyst Balkans
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business ManagersMiguel Garcia
 
Addressing the gap of women in leadership | Talent Connect Anaheim
Addressing the gap of women in leadership | Talent Connect AnaheimAddressing the gap of women in leadership | Talent Connect Anaheim
Addressing the gap of women in leadership | Talent Connect AnaheimLinkedIn Talent Solutions
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsVeracode
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?AIIM International
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaCatalyst Balkans
 

Tendances (15)

mADL 2012 Introduction
mADL 2012 IntroductionmADL 2012 Introduction
mADL 2012 Introduction
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Nonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansNonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western Balkans
 
Cloud for Business Managers
Cloud for Business ManagersCloud for Business Managers
Cloud for Business Managers
 
Addressing the gap of women in leadership | Talent Connect Anaheim
Addressing the gap of women in leadership | Talent Connect AnaheimAddressing the gap of women in leadership | Talent Connect Anaheim
Addressing the gap of women in leadership | Talent Connect Anaheim
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
Infographic: Mobile user is always on
Infographic: Mobile user is always onInfographic: Mobile user is always on
Infographic: Mobile user is always on
 
How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North Macedonia
 

En vedette

@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges Atchison Frazer
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Matthew Rosenquist
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 

En vedette (6)

@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges @AtchisonFrazer Enterprise Mobile Security Trends, Challenges
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 

Similaire à 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Why terminal emulation 2
Why terminal emulation 2Why terminal emulation 2
Why terminal emulation 2Flynet Limited
 
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...Flynet Limited
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileMonitise MEA
 
Mobile Testing Methodologies: Trends, Successes, and Pitfalls
Mobile Testing Methodologies: Trends, Successes, and PitfallsMobile Testing Methodologies: Trends, Successes, and Pitfalls
Mobile Testing Methodologies: Trends, Successes, and PitfallsTechWell
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Bitglass
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policymaarten77
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policyWendyvanmeer
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Mobile Testing in the Cloud
Mobile Testing in the CloudMobile Testing in the Cloud
Mobile Testing in the CloudTechWell
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 

Similaire à 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud (20)

Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Why terminal emulation 2
Why terminal emulation 2Why terminal emulation 2
Why terminal emulation 2
 
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Shift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes MobileShift of the Decade: Enterprise Goes Mobile
Shift of the Decade: Enterprise Goes Mobile
 
Mobile Testing Methodologies: Trends, Successes, and Pitfalls
Mobile Testing Methodologies: Trends, Successes, and PitfallsMobile Testing Methodologies: Trends, Successes, and Pitfalls
Mobile Testing Methodologies: Trends, Successes, and Pitfalls
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policy
 
Developing effective mobile policy
Developing effective mobile policyDeveloping effective mobile policy
Developing effective mobile policy
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Mobile Testing in the Cloud
Mobile Testing in the CloudMobile Testing in the Cloud
Mobile Testing in the Cloud
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 

Plus de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 

Plus de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 

Dernier

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Dernier (20)

20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud

  • 1. 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud © 2013 Monterey Technology Group Inc. Sponsored by
  • 2. Thanks to © 2013 Monterey Technology Group Inc. www.Lumension.com
  • 3.  Who are we?  SIEM/Monitoring  Top priorities 2014  Top risks 2014 Preview of Key Points  Webinar topics for 2014  Application control  Virtualization  Cloud  Mobile  Future
  • 4. 1 to 9 5.2% 10 to 49 6.4% 50 to 99 5.5% 5,000+ 33.2% What’s your size? 100 to 499 16.1% 500 to 999 8.9% 2,000 to 4,999 13.0% 1,000 to 1,999 11.7%
  • 5. Industry Financial Services High Technology Professional Services Healthcare Public Sector (State & Local Government) Education and Research Public Sector (Federal Government) Aerospace & Defense Communications Industrial Manufacturing Retail Utilities Media and Entertainment Travel & Transportation Consumer Goods Oil & Gas Engineering and Construction Automotive Chemicals Natural Resources 0.0% 5.0% 10.0% 15.0% 20.0% 25.0%
  • 6. 7% Who are you? 26% Technical Manager / Director VP and above 67%
  • 7. 4.4% North America (US and Canada) 15.2% Americas (outside NA) Where are you? 4.1% United Kingdom 2.4% EMEA (Europe, Middle East, Africa) 73.8% APAC (Asia Pacific)
  • 9.  Logging  Event forwarding  Event correlation  Applications     Webinar topics for 2014 SQL Exchange SharePoint More  Linux/Unix  Cloud audit logging  VMWare  APTs  Prevention  Detection  Endpoint  BitLocker vs other solutions  Monitoring endpoints  Mobile security  Virtualization security  Data protection
  • 10. Compliance Monitoring Client Security Top Priorities for 2014 0% 0% 1%1% 3% 1% 3% 3% 3% 3% 4% Business 15% Misc IT Misc Security Network Security 13% 4% Patch mgt Data Loss Prevention 4% Vulnerability Management 11% 4% 4% 5% 6% 10% IAM and Authentication Awareness Virtualization Quantified Risks Training Cloud
  • 11.  Winner: Malware  Sophistication  Desktop/Laptop  Mobile device  Runners up Greatest Risks for 2014     Application vulnerabilities Data security in the cloud OS vulnerabilities Spear Phishing attacks  Other  End-user security awareness  Data loss/leakage  Insider  APT  IAM  Rights  Privileged accounts OTHER DDOS ATTACKS MAN-IN-THE-MIDDLE OR OTHER BROWSER ATTACKS MALWARE VIA MOBILE DEVICES (E.G., SMARTPHONES, TABLETS) SPEAR PHISHING ATTACKS 6.1% 15.0% 19.8% 33.5% 35.4% OS VULNERABILITIES 36.9% DATA SECURITY IN THE CLOUD 37.1% APPLICATION VULNERABILITIES 42.7% MALWARE VIA ENDPOINT (E.G., DESKTOP, LAPTOP) 46.5% MALWARE SOPHISTICATION 46.9%
  • 12.  What do you currently/plan to virtualize? 100% 90% 80% 70% 60% Virtualization 50% 40% 30% 20% 10% 0% Servers Endpoints Applications Mobile Other No Plans 4.62% 39.83% 31.89% 70.71% 90.04% Plan to Deploy 5.05% 23.09% 21.21% 13.85% 5.34% Currently Deployed 90.33% 37.09% 46.90% 15.44% 4.62%
  • 13. Perceived effectiveness of security technologies Other Mobile device management (MDM) Personal firewalls Application Control Application control (whitelisting) Endpoint data loss prevention (DLP) Anti-spyware Host-based intrusion prevention Port and device control Anti-malware Vulnerability assessment Full-disk and file encryption (mobile data protection) 50 55 60 65 70 75
  • 14. Perceived effectiveness of whitelisting between current/planned/non-users Application Control
  • 16. Biggest concern regarding mobile devices Mobile Devices
  • 17. Is your organization moving towards adopting clouddelivered applications? Cloud usage
  • 18. For those moving to the cloud, is security keeping up? Cloud usage
  • 19. We asked about personal and business cloud usage in the organization … Do you allow personal cloud applications on your endpoints? Cloud Usage Do you have policies restricting data being moved to and from the personal cloud? Do you have enforcement mechanisms managing data being moved to and from the personal cloud? Does your organization have a business cloud for data storage and exchange of files? Yes (37.3%) Yes (51.8%) No (62.7%) No (48.2 %) No (81.1%) Yes (39.2%) No (60.8%)
  • 20. What metrics does your management measure you on? Metrics (alt. view) other
  • 21. We asked several questions about where endpoint security was headed … Changing Security Paradigms
  • 22.  Security analytics is here to stay at UWS  Mobile, APT, Malware and Data Loss are foremost on the risk radar  Endpoint security is a common denominator for all of them Bottom line  Endpoint security more important than ever  Mobile device trend reinforces this  Cloud trend is limited and does not change this  Virtualization of endpoints and application delivery is a complementary issue  What’s happening at endpoint security leader Lumension?