Date post: | 21-Mar-2018 |
Category: |
Documents |
Upload: | phamkhuong |
View: | 219 times |
Download: | 5 times |
2016 VORMETRIC DATA THREAT REPORTTrends in Encryption and Data Security
Sponsoring Partners
Global Edition
2016 VORMETRICDATA THREAT REPORT – GLOBAL EDITION
1114 IT DECISION MAKERSUS (505), UK (101), DE (100), JP (102), AUS(100), MEX (103), BRZ (103)
HealthcareRetail OtherEnterprise
FinancialServices
Enterprises of: $250M+ for US, UK, DE, JP$100M+ for BRZ, MEX, AUS
Polling and Analysis by 451 Research
100%
Government
WHY IS COMPLIANCETHE TOP CONCERN?
91% 61%VULNERABLE TO DATA THREATS
9%
61%
22%
8%
NOT VULNERABLESOMEWHATVULNERABLEVERY VULNERABLEEXTREMELY VULNERABLE
HAD A DATA BREACH
RATES OF VULNERABILITY TO DATA THREATS
COMPLIANCE DOES NOT EQUALDATA BREACH PREVENTION
64%46%
BELIEVE COMPLIANCE IS EFFECTIVE AT PREVENTING DATA BREACHES
Compliance does not ensure security”..being compliant does not mean you won’t be breached”
“
“
Garrett BekkerSr. Analyst Enterprise Security, 451 Research
(58% IN THE 2015 REPORT)
RANK COMPLIANCE AS A TOP 3 IT SECURITY SPENDING PRIORITY
Rates of ranking as a Top 3 IT Security Spending Priority 39% - BEST PRACTICES
32% - PARTNERS/CUSTOMERS
46% - COMPLIANCE
46% - REPUTATION AND BRAND PROTECTION
36% - DATA BREACH AVOIDANCE
PUTTING FAITH INTHE WRONG DEFENCES
INCREASES IN IT SECURITY SPENDING PLANS BY CATEGORY
44% - ANALYSIS & CORRELATION TOOLS
48% - NETWORK DEFENSES
40% - DATA IN MOTION DEFENSES
39% - DATA AT REST DEFENSES
… perimeter defenses offer little help defending against multi‐stage attacks”
“It’s no longer enough just to secure networks and endpoints”
“
Garrett BekkerSr. Analyst Enterprise Security, 451 Research
… data‐at‐rest approaches have proven to be effective at protecting the data itself”
“
INCREASES IN SPENDING ON DATA AT REST DEFENSES FELL
47%
2014
39%
201544% - END POINT AND MOBILE
SOME ORGANIZATIONSARE GETTING IT RIGHT
58%INCREASING SPENDING ONIT SECURITYTO PROTECT SENSITIVE DATA
NOW MAKE PREVENTING DATA BREACHES A TOP SPENDING PRIORITY
36%
IMPLEMENTING EFFECTIVE DATA SECURITY TOOLS
39% - MULTI-FACTOR AUTHENTICATION
38% - SIEM SYSTEMS
40% - APPLICATION LAYER ENCRYPTION
39% - TOKENIZATION
38% - CLOUD SECURITY GATEWAY
GLOBAL VULNERABILITYTO DATA THREATS
GLOBAL
VULNERABLE VERY/EXTREMELY VULNERABLE
VERY OR EXTREMELY VULNERABLE
SOMEWHAT OR MORE
VULNERABLE
16%
84%
UNITEDSTATES
REGIONAL
UNITEDKINGDOM
23% 10%40%JAPAN MEXICOGERMANY
82%91%89%
12% 16%
84%
54%
94%
BRAZIL AUSTRALIA
36%
92% 93%
91% 34%
GLOBAL SPENDINGPRIORITY VARIATIONS
INCREASING DATA-AT-REST DEFENSE SPENDING
INCREASING SPENDING TO PROTECT DATA74% 62% 51%65% 63% 31%50%
U.S. U.K.MEXICOBRAZIL GERMANY AUS JAPAN
48% 45% 34%40% 37% 20%29%U.S. U.K.MEXICOBRAZIL GERMANY AUS JAPAN
US spending increase
2X or morethan Japan’s to protect data
In spite of TalkTalk & MumsNet
U.K. 11% behind U.S.in data-at-rest protection
39%
58%
45%
35%
EXECUTIVE MANAGEMENT
CONTRACTOR ACCOUNTS
INTERNAL AND EXTERNALDATA THREATS
THE MOST DANGEROUS INSIDERS (TOP 3 SELECTION)
TOP EXTERNAL THREATS
15% 12%39% 19% 15%CYBER CRIMINALS
HACKTIVISTSCYBER-
TERRORISTS
NATION STATES
COMPETITORS
PRIVILEGED USERS
SERVICE PROVIDER ACCOUNTS
ENCRYPTION TECHNOLOGIESA RECOGNIZED SOLUTION TO THE PROBLEMUSE ENCRYPTION TO:
41%
31%
53%
52%
38%
19%
BEST PRACTICES TO PROTECT DATA
MEET COMPLIANCE REQUIREMENTS
AVOID PR/REPUTATION DAMAGE
MEET DATA RESIDENCY REQUIRMENTS
AVOID LEGAL/FINANCIAL IMPACTS
PROTECT IP/COMPETITIVE ADVANTAGE
WHAT SHOULDORGANIZATIONS BE DOING
Get a better handle on where organization is using sensitive data – Both internal and external locationsDiscover and classify
Encryption and access control
Use encryption for more than just meeting compliance checklists. Consider an Encrypt Everything policy.
Use platform solutions that deliver a broad range of data security solutions on a single platform to reduce costs
Data security platforms
Security analytics Use data access monitoring combined with other threat indicators to identify threat activity patterns
Vormetric Data Security#DefenderOfData
VisionTo Secure the World’s Information
PurposeProtect business assets and brand
Customers1500+ Customers Across 21 Countries
17 of Fortune 30
30+ Cloud and Hosting Providers
Global PresenceGlobal Headquarters - San Jose, CA, USA
EMEA Headquarters - Reading, United Kingdom
APAC Headquarters - Singapore
Data-at-Rest Protection ProductsTransparent Encryption, Application-layer Encryption
Tokenization with Dynamic Data Masking
Cloud Encryption Gateway
Protection for Teradata Database
Key Management
Questions?
NameTitle
Contact