Subscribe to Email Updates

Latest Blog Post

Why it is Time to Revise Your Security Plan

Deb Gannaway
by Deb Gannaway on Nov 1, 2016 10:43:00 AM

Today's threat landscape requires a move away from ad hoc, siloed security purchases.  Organizations need a systematic approach and security strategy that gives IT deeper insight throughout the entire company, network and smart device ecosystem.

Security is getting harder and harder to manage thanks to the increased use of mobile devices, increases in collaboration with third 03A11281-893765-edited.jpgparty partners and the increase in the kinds of devices now connecting to the Internet, often called the Internet of Things or IoT.  Keeping companies secure is compounded by the fact that cyber-attacks are becoming more difficult to detect - some attacks don't even use files.

Consider these statistics:

  • 28 percent of security incidents are targeted attacks
  • The estimated annual cost to the global economy from cybercrime is a conservative $400 billion
  • One consulting firm, Strategic News Service, estimates global losses of $3.5 Trillion in just three sectors - telecom equipment, solar energy, and defense - between 2003-2013 by a single cyber thief: the Chinese government
  • 51 percent of employees in one survey said they would go around policies that restrict use of their own devices or cloud storage services
  • Nearly 50 percent of employees use their own devices without their employer's knowledge
  • 40 percent of firms say they can't effectively manage identities and access management via the cloud
  • 66 percent of data breaches took months, and sometimes years to discover
  • Malicious attacks take an average of 256 days to identify, data breaches take an average of 158
  • The average organizational cost of a data breach is now $5.4 million
  • By 2020, the number of IoT devices is estimated to reach 26 billion units
  • 70 percent of IoT devices contain at least 1 security flaw; the average is 25 flaws

Those alone are enough to make anyone cringe, let alone the CSO.

Security Demands Optimized Approach

To help reduce those numbers, companies are fortifying their defenses. Companies around the world are becoming increasingly aware that the traditional approach to cybersecurity isn't effective. The traditional siloed approach is not sustainable, takes a large bite out of limited budgets and leaves the security environment vulnerable to failure.

Today's threat landscape calls for an integrated, optimized approach where you invest in easier-to-manage, high-value protection where security keeps pace with the ever-evolving threat environment. An optimized platform is able to protect against all types of attacks, actively improves your security posture and delivers operationally effective security.

According to Intel Security, when compared to disconnected, non-integrated architectures, their open, connected security system is able to:

  • Reduce overall time to protection from more than four hours to one minute
  • Increase incident response capacity by up to 30 times
  • Improve response time from 24 hours to less than seven minutes

There is a growing focus on integration and automation in the security industry.  Again, according to Intel Security, an integrated security system that automates the threat defense lifecycle enables organizations to be 30% more protected and can reduce resource-draining manual efforts by up to 70%.*

Companies need a security platform that enables them to integrate best of breed technologies across all vendors and allows visibility into the entire security infrastructure. It also protects all your assets, from customer information to financial information to your company's reputation, and evolves as the attacks change.

 If you want to change your siloed, traditional approach to security, we can help.

 *White Paper: Automating the Threat Defense Lifecycle

 

Leave a comment

Deb Gannaway
Written by Deb Gannaway
Written by Author

Related posts

To Increase Security, Lock Down User Privileges

There is incredible value in taking a ‘back to basics’ approach to endpoint security. Focusing efforts on the fundamental...

Travis Abrams
By Travis Abrams - May 23, 2017
The Importance of Data Backup and Recovery in Any Security Strategy

It cannot be overstated: a “back to basics” approach to system security can reduce the number of administrative tasks and...

Travis Abrams
By Travis Abrams - May 18, 2017
Why You Need a Back to Basics Approach for Network Security

With the abundance of cybersecurity threats and vulnerabilities today, it can be tempting to see purchasing the latest security...

Travis Abrams
By Travis Abrams - May 15, 2017