SlideShare a Scribd company logo
1 of 52
Download to read offline
2011 Threat Management Survey
Global Data
Methodology
• Survey performed by Applied Research
• 1,025 global enterprises
• Tactical IT, Strategic IT and
  C-level professionals
• Cross-industry




                                         2
Key Findings
• Enterprises not confident in their security posture
• Organizations struggling with timely analysis and response
• Top concerns are security intelligence and visibility
• Staffing problems top list of issues impacting ability to respond to new and
  emerging threats




                                                                                 3
Security Confidence
• 57% lack confidence in IT security staffs’ ability to respond to new threats
• Why? Several of the factors tied to staffing
  – Not enough staff
  – Staff lacks time




                                                                                 4
Staffing Issues
• 66% rate staff as less than effective
• Only 4% rate staff as completely effective
• Why?
  – Recruiting
  – Retention
  – Right skill sets
Top Security Concerns
• Intelligence
• Visibility
• Analysis




                        6
Security Shortcomings
• Timely and quality alert correlation/analysis
• Timely and effective event response




                                                  7
Symantec Recommendations
• Build a comprehensive incident management program
• Be vigilant about the changing threat landscape
• Broaden the visibility across your infrastructure
• Evaluate systems for managing security information and alerts
Appendix
All questions included


                         9
Demographics


               10
Q2: How many employees does your organization have in all
                                      locations worldwide?


1,000 to 2,499                                                              33%




2,500 to 4,999                                                              33%




5,000 or more                                                                 34%




                 0%        5%       10%     15%      20%     25%      30%           35%   40%
                                                                                           11
Q3: What is your organization's primary industry?
                                                       Advertisement          1%
                                                               Media               2%
      Living-related and personal services and amusement services                  2%
                                                                Legal              2%
                                                              Energy               2%
Transport and freight service (cover such as Airline/railway industry)                   3%
                                                              Internet                   3%
                     Eating and drinking services, accommodations                        3%
                           Real estate and goods rental and leasing                           4%
                                                         Government                           4%
                                   Education, Learning and Support                            4%
                                                        Construction                                5%
                                   Medical, Health Care and Welfare                                      6%
                                                       Manufacturing                                                9%
                                                                Other                                                    10%
                                                Wholesale and Retail                                                     10%
             Scientific research, professional and technical services                                                    10%
                       Information Technology and Communications                                                         10%
                                              Finance and Insurance                                                      10%
                                                                         0%         2%         4%         6%   8%          10%   12%
                                                                                                                                  12
Q4: What is your primary role?


                              Manage our computing resources                                   25%




Management role in IT, primarily focused on tactical/operational
                                                                                               25%
                           issues




   Management role in IT, primarily focused on strategic issues                                25%




                                     C-level or business owner                                 25%



                                                                   0%   5%   10%   15%   20%     25%   30%
                                                                                                        13
Q5: What is your title?
                                                 President              2%

                                                    Owner          3%

                                                   Partner         1%

                                                       CIO                                               25%

                                                      CTO                5%

                                                     CISO          1%

Vice President or Senior Vice President in a computing area             4%

                               Director in a computing area                       9%

    Manager of Information Systems or Computer Systems                                             22%

                                          Systems analyst                              12%

                                         Systems architect         3%

                                         Systems designer          3%

                                                     Other                             11%

                                                              0%             5%        10%   15%   20%     25%   30%
                                                                                                                  14
What is your age?

     50 or older (Boomer)
             10%            30 or less (Millennial)
                                     22%




31 to 49 (Gen-X)
      68%




                                                      15
Q7: What is your gender?

Female
 19%




                              Male
                              81%




                                     16
Q8: How many years have you been working in computer systems
                           and technology?
14


                12.88
12
                                                     12

10



 8



 6



 4



 2



 0
                Mean                                Median
                                                                    17
Q9: What are your company's annual revenues?
                Less than $500,000         2%

             $500,000 to $2,000,000             3%

           $2,000,000 to $7,500,000             4%

          $7,500,000 to $30,000,000                       5%

        $30,000,000 to $100,000,000                                      9%

      $100,000,000 to $500,000,000                                                        15%

     $500,000,000 to $1,500,000,000                                                             16%

   $1,500,000,000 to $5,000,000,000                                                             16%

  $5,000,000,000 to $25,000,000,000                                                             16%

$25,000,000,000 to $100,000,000,000                            7%

        More than $100,000,000,000                                  7%

                                      0%   2%        4%        6%        8%   10%   12%   14%     16%   18%
                                                                                                         18
Q10: Characterize your company's year-over-year annual growth
                               rate in terms of annual revenue:
                         Decline to state        3%

     Growing at 100% per year or more            0%

         Growing at 50 to 99% per year                 5%

         Growing at 25 to 49% per year                       7%

Growing at between 10 to 24% per year                                                          29%

   Growing at between 1 to 9% per year                                                               31%

      Flat: Neither growing nor declining                              11%

  Declining at between 1 to 9% per year                4%

Declining at between 10 to 24% per year                           9%

      Declining 25% per year or greater           1%

                                            0%              5%         10%   15%   20%   25%         30%   35%
                                                                                                            19
Security Self-Assessment


                           20
Q213: How confident are you that your IT security staff can handle
                  new security threats in a timely and effective manner?

      Very confident                                       19%




 Somewhat confident                                                      25%




            Neutral                                        19%




Somewhat concerned                                       18%




     Very concerned                                              20%


                       0%   5%         10%         15%             20%         25%   30%
                                                                                      21
Q214: What are the top three factors that are keeping you from
                  being completely confident in your ability to handle new security
                            threats in a timely and effective manner?
                                        (Ranked 1, 2, or 3)

No access to latest information about new threats, vulnerabilities, etc.                                             36%


                   Security staff lacks necessary experience/skill sets                                                    39%


 Trouble responding to security incidents in a timely/effective manner                                                           43%


                                       Staff doesn't have enough time                                                              45%


  Trouble correlating/analyzing security alerts as they are happening                                                              45%


         Not enough visibility into security across entire infrastructure                                                          45%


                                               Insufficient security staff                                                             46%

                                                                             0%   5%   10%   15%   20%   25%   30%     35%       40%    45%   50%
                                                                                                                                               22
Security Lifecycle


                     23
Q215: Please review the following aspects of security and rank
                   them in terms of what concerns you the most.
100%

90%                                                       17%                18%
                                     24%

80%            41%

                                                                             20%
70%                                                       28%
                                     25%
60%
                                                                                            1
50%                                                                          25%            2
               27%                                                                          3
40%                                                       28%
                                     28%                                                    4

30%

               19%
20%                                                                          38%
                                                          27%
10%                                  23%
               13%
 0%
       Security intelligence   Security visibility   Attack analysis   Security response
                                                                                           24
Q215: Please review the following aspects of security and rank
                   them in terms of what concerns you the most.
                                 (Average Ranks)
    Security intelligence   Security visibility   Attack analysis   Security response
0




1




2               2.04

                                    2.50
                                                       2.64
                                                                           2.82

3




4
                                                                                        25
Q216: Please rank these aspects in terms of your organization's
                                ability to execute.
100%

90%                                                       19%                17%
                                     26%
80%            38%

                                                                             21%
70%
                                                          25%

60%                                  26%
                                                                                            1
50%                                                                          24%            2
               29%
                                                                                            3
40%                                                       29%
                                                                                            4
                                     28%
30%
               19%
20%                                                                          38%
                                                          26%
10%                                  21%
               15%

 0%
       Security intelligence   Security visibility   Attack analysis   Security response
                                                                                           26
Q216: Please rank these aspects in terms of your organization's
                                ability to execute.
                                (Average Ranks)
    Security intelligence   Security visibility   Attack analysis   Security response
0




1




             2.10
2
                                    2.44
                                                       2.62
                                                                          2.83

3




4
                                                                                        27
Q217: When it comes to keeping up with the latest cyber-security
          vulnerabilities and threats, please rate how you are doing in the
                                   following areas:
       1 - Extremely poor     2 - Somewhat poor         3 - Neither poor nor well    4 - Somewhat well        5 - Extremely well
100%

90%
                                 24%                                                                27%
80%

70%

60%
                                 41%
                                                                                                    40%
50%

40%

30%
                                 25%
20%                                                                                                 26%

10%
                                 7%
                                                                                                      5%
 0%                              3%                                                                   1%
            Acquiring such intelligence in a timely fashion                         The quality of intelligence you gather
                                                                                                                                   28
Q217: When it comes to keeping up with the latest cyber-security
                vulnerabilities and threats, please rate how you are doing in the
                                         following areas.
                                   (Somewhat/Extremely well)



        The quality of intelligence you gather                                             68%




Acquiring such intelligence in a timely fashion                                       65%




                                                  0%   10%   20%   30%   40%   50%   60%         70%   80%
                                                                                                        29
Q217: When it comes to keeping up with the latest cyber-security
                vulnerabilities and threats, please rate how you are doing in the
                                         following areas.
                                  (Somewhat/Extremely poorly)



        The quality of intelligence you gather                   6%




Acquiring such intelligence in a timely fashion                              10%




                                                  0%   2%   4%   6%   8%      10%   12%
                                                                                     30
Q218: When it comes to maintaining visibility into security across
         the entire company's infrastructure, please rate how you are doing
                          in each of the following areas:
       1 - Extremely poor        2 - Somewhat poor      3 - Neither poor nor well       4 - Somewhat well      5 - Extremely well
100%

90%                                                                 21%                                          22%
                       27%
80%

70%

60%
                                                                    44%                                          42%
                       39%
50%

40%

30%

20%                    27%                                          27%                                          27%

10%
                       6%                                           7%                                        7%
 0%                    1%                                           1%                                        1%
           The quality of that visibility       Acquiring such visibility in a timely fashion     How comprehensive the visibility is
                                                                                                                                        31
Q218: When it comes to maintaining visibility into security across
                the entire company's infrastructure, please rate how you are doing
                                 in each of the following areas.
                                   (Somewhat/Extremely well)


       How comprehensive the visibility is                                           65%




Acquiring such visibility in a timely fashion                                         65%




                The quality of that visibility                                            66%




                                                 0%   10%   20%   30%   40%   50%   60%         70%
                                                                                                 32
Q218: When it comes to maintaining visibility into security across
                the entire company's infrastructure, please rate how you are doing
                                 in each of the following areas.
                                 (Somewhat/Extremely poorly)


       How comprehensive the visibility is                                                    8%




Acquiring such visibility in a timely fashion                                                 8%




                The quality of that visibility                                      7%




                                                 0%   1%   2%   3%   4%   5%   6%        7%    8%   9%
                                                                                                    33
Q219: When it comes to your organization's ability to correlate and
         analyze security alerts across the enterprise, please rate how you
                     are doing in each of the following areas:
       1 - Extremely poor     2 - Somewhat poor        3 - Neither poor nor well      4 - Somewhat well        5 - Extremely well
100%

90%
                                25%                                                                   27%
80%

70%

60%
                                42%                                                                   41%
50%

40%

30%

20%                             27%                                                                   26%

10%
                                 5%                                                                    5%
 0%                              1%                                                                    1%
              The timeliness of correlation and analysis                           The quality of the correlation and analysis
                                                                                                                                    34
Q219: When it comes to your organization's ability to correlate and
               analyze security alerts across the enterprise, please rate how you
                           are doing in each of the following areas.
                                  (Somewhat/Extremely well)



The quality of the correlation and analysis                                             68%




The timeliness of correlation and analysis                                             67%




                                              0%   10%   20%   30%   40%   50%   60%          70%   80%
                                                                                                     35
Q219: When it comes to your organization's ability to correlate and
               analyze security alerts across the enterprise, please rate how you
                           are doing in each of the following areas.
                                 (Somewhat/Extremely poorly)



The quality of the correlation and analysis                                    6%




The timeliness of correlation and analysis                                           7%




                                              0%   1%   2%   3%   4%    5%      6%        7%
                                                                                          36
Q220: When it comes to your organization's ability to respond to
            security events, please rate how you are doing in each of the
                                   following areas:
       1 - Extremely poor      2 - Somewhat poor          3 - Neither poor nor well   4 - Somewhat well      5 - Extremely well
100%

90%
                                 25%                                                                28%
80%

70%

60%
                                 45%                                                                42%
50%

40%

30%

20%                              24%                                                                25%
10%
                                  5%                                                                 5%
 0%                               1%                                                                 1%
                 Ability to respond in a timely fashion                               The effectiveness of your response
                                                                                                                                  37
Q220: When it comes to your organization's ability to respond to
                   security events, please rate how you are doing in each of the
                                          following areas.
                                    (Somewhat/Extremely well)



The effectiveness of your response                                                69%




Ability to respond in a timely fashion                                            70%




                                         0%   10%   20%   30%   40%   50%   60%         70%   80%
                                                                                               38
Q220: When it comes to your organization's ability to respond to
                   security events, please rate how you are doing in each of the
                                          following areas.
                                   (Somewhat/Extremely poorly)



The effectiveness of your response                                            6%




Ability to respond in a timely fashion                                                  7%




                                         0%   1%   2%   3%     4%       5%         6%        7%
                                                                                             39
Security Staffing


                    40
Q221: How would you characterize your security staffing levels at
                                    the current time?

    We are extremely overstaffed          4%




    We are somewhat overstaffed                     11%




We have just enough security staff                                                       41%




   We are somewhat understaffed                                              32%




   We are extremely understaffed                    11%


                                     0%        5%   10%   15%   20%   25%   30%    35%    40%   45%
                                                                                                 41
Q222: Overall, how would you rate the effectiveness of your IT
                                        security staff?

                         Completely effective              10%




                              Mostly effective                                                               42%




Not as good as we would like, but not horrible                                       24%




                        Somewhat ineffective                           15%




                       Completely ineffective              10%


                                                 0%   5%         10%         15%   20%     25%   30%   35%   40%   45%
                                                                                                                    42
Q223: What is keeping you from rating your security staffing as
         "completely effective?" Rank the following areas of cyber security
                 staffing in terms of difficulty for your organization.
100%
                                                                                 6%
                                   17%           16%            14%
90%                   19%                                                       10%
         29%
80%                                                             14%
                                   18%           18%                            20%
70%                   23%
         17%                                                    16%                        1
60%                                              13%
                                   18%                                          16%        2
50%                   15%                                       14%                        3
         18%                                     16%                                       4
40%                                                                             19%
                                   21%                                                     5
                      18%                                       15%
30%                                                                                        6
         15%
                                                 22%
20%
                      17%          15%
         12%                                                    27%             29%
10%
                                                 15%
         10%           9%          11%
 0%
       Recruiting   Retention    Skill sets   Experience   Staff retirement   Awareness
                                                                                          43
Q223: What is keeping you from rating your security staffing as
          "completely effective?" Rank the following areas of cyber security
                 staffing in terms of difficulty for your organization.
                                   (Average Ranks)
    Recruiting      Retention     Skill sets   Experience   Staff retirement   Awareness
0


1


2

       2.93
                       3.18
3                                    3.29
                                                  3.56
                                                                  3.85
4                                                                                4.19



5


6
                                                                                           44
Managed Security Service Providers


                                     45
Q224: What managed security service provider vendors are you
                        considering using or do you currently use?
                                   (Mark all that apply.)

                          Other (Please specify)        5%


                                BT/Counterpane                      16%


We don't use a managed security service provider                     17%


                               Verizon Business                                  24%


                              Dell/SecureWorks                                               29%


                                          AT&T                                                30%


                                        IBM/ISS                                                            39%


                                      Symantec                                                                 40%

                                                   0%    5%   10%   15%    20%         25%         30%   35%     40%   45%
                                                                                                                        46
Q225: How much influence does your managed security service
                    provider have over which security products your company
                                          purchases?

   Complete influence                        13%




 A moderate influence                                                        35%




                Neutral                                          28%




    Very little influence                    14%




Absolutely no influence               10%


                            0%   5%    10%         15%   20%   25%     30%     35%   40%
                                                                                      47
SIEM


       48
Q226: What Security Information and Event Management (SIEM)
                               vendors do you currently use?
                                     (Mark all that apply.)

Other (Please specify)        1%



             Q1 Labs                     16%



 We don't use a SIEM                           19%



 EMC/RSA (enVision)                                  22%



         HP/ArcSight                                         34%



            Symantec                                                           55%


                         0%        10%               20%   30%     40%   50%         60%
                                                                                      49
Q227: How do the following challenges impact your ability to realize
               the full value of your Security Information and Event Management
                                         (SIEM) solution?
             1 - Extreme impact            2 - Moderate impact            3 - Some impact             4 - Slight impact            5 - No impact whatsoever
100%
              9%                  10%                  12%                 11%                  12%                  11%                  14%               14%
90%

80%                               25%
              27%                                      23%                 24%                  26%                  26%                                    22%
                                                                                                                                          24%
70%

60%

50%           28%                 30%                  30%                 31%                  28%                  29%                  29%               31%
40%

30%
              17%
                                  23%                  23%                 22%                  20%                  19%                  21%               22%
20%

10%           19%
                                  13%                  13%                 12%                  14%                  15%                  12%               11%
 0%
       Insufficient staff to        Trouble        Staff doesn't have      Trouble        Insufficient staff to     Trouble             Insufficient     Insufficient
              set up          integrating latest      enough time     maintaining SIEM         maintain          responding to      training to set up    training to
                                information on                             rules to                               incidents in                             maintain
                                 new threats,                         correlate/analyze                         timely/effective
                             vulnerabilities, etc.                    alerts in real time                           manner
                                                                                                                                                                        50
Q227: How do the following challenges impact your ability to realize
                the full value of your Security Information and Event Management
                                          (SIEM) solution?
                                     (Moderate/Extreme impact)
                                            Insufficient training to maintain                                     33%

                                              Insufficient training to set up                                      34%

               Trouble responding to incidents in timely/effective manner                                           34%

                                               Insufficient staff to maintain                                       34%

   Trouble maintaining SIEM rules to correlate/analyze alerts in real time                                          34%

                                           Staff doesn't have enough time                                               35%

Trouble integrating latest information on new threats, vulnerabilities, etc.                                            36%

                                                 Insufficient staff to set up                                            36%

                                                                                0%   5%   10%   15%   20%   25%   30%     35%   40%
                                                                                                                                 51
Q227: How do the following challenges impact your ability to realize
                the full value of your Security Information and Event Management
                                          (SIEM) solution?
                                         (Slight/No impact)
                                            Insufficient training to maintain                                            36%

                                              Insufficient training to set up                                             38%

               Trouble responding to incidents in timely/effective manner                                                 37%

                                               Insufficient staff to maintain                                                 38%

   Trouble maintaining SIEM rules to correlate/analyze alerts in real time                                              35%

                                           Staff doesn't have enough time                                               35%

Trouble integrating latest information on new threats, vulnerabilities, etc.                                        35%

                                                 Insufficient staff to set up                                            36%

                                                                                0%   5%   10%   15%   20%   25%   30%     35%       40%   45%
                                                                                                                                           52

More Related Content

Viewers also liked

RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report2012 January Symantec Intelligence Report
2012 January Symantec Intelligence ReportSymantec
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec
 
Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014Symantec
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
числа фибоначчи
числа фибоначчичисла фибоначчи
числа фибоначчиKristina Goychu
 
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.) И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.) Irina Wickholm
 
Deploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGIDeploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGI정주 김
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec
 
Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleJordi Soucheiron
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Symantec LATAM
 
Mi dossier fotográfico
Mi dossier fotográficoMi dossier fotográfico
Mi dossier fotográficoFabreFlames
 

Viewers also liked (14)

RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report2012 January Symantec Intelligence Report
2012 January Symantec Intelligence Report
 
Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011Symantec Intelligence Report July 2011
Symantec Intelligence Report July 2011
 
Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014Top 10 Reasons to upgrade to BackupExec 2014
Top 10 Reasons to upgrade to BackupExec 2014
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
testing.pptx
testing.pptxtesting.pptx
testing.pptx
 
числа фибоначчи
числа фибоначчичисла фибоначчи
числа фибоначчи
 
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.) И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
И. Иванова, Р. Усманов. Жалоба в Котельнический суд (24.12.2014 г.)
 
Backstopper 3-D Dodgeball
Backstopper 3-D DodgeballBackstopper 3-D Dodgeball
Backstopper 3-D Dodgeball
 
Deploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGIDeploying flask with nginx & uWSGI
Deploying flask with nginx & uWSGI
 
Symantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global ResultsSymantec 2011 CIP Survey Global Results
Symantec 2011 CIP Survey Global Results
 
Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
 
Mi dossier fotográfico
Mi dossier fotográficoMi dossier fotográfico
Mi dossier fotográfico
 

Similar to Symantec 2011 Threat Management Survey Global Results

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsCA Nimsoft
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-resultsAccenture
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights Travis Burge
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012Edelman
 
Get To Know Your Ba
Get To Know Your BaGet To Know Your Ba
Get To Know Your BaJohny Bravo
 
2012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 20122012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 2012Symantec
 
Iavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BAIavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BACodecamp Romania
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant ReportConnell & Partners
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Jen Landsberg
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Derek E. Weeks
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer ResearchJon Gatrell
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM surveyThe Reference
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social mediaJosh Feldberg
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 
How Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility TrendsHow Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility TrendsSteelwedge
 

Similar to Symantec 2011 Threat Management Survey Global Results (20)

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and Budget
 
The Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPsThe Top Reasons Enterprises Outsource IT to MSPs
The Top Reasons Enterprises Outsource IT to MSPs
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights LinkedIn Australian Demographic Insights
LinkedIn Australian Demographic Insights
 
HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012
 
Get To Know Your Ba
Get To Know Your BaGet To Know Your Ba
Get To Know Your Ba
 
2012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 20122012 SMB Disaster Preparedness Survey Global Results May 2012
2012 SMB Disaster Preparedness Survey Global Results May 2012
 
Iavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BAIavi Rotberg - Get to know your BA
Iavi Rotberg - Get to know your BA
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report
 
Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™Deloitte 2011 technology fast 500™
Deloitte 2011 technology fast 500™
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM survey
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social media
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
How Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility TrendsHow Agile is Your Business? New Research on Agility Trends
How Agile is Your Business? New Research on Agility Trends
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Symantec 2011 Threat Management Survey Global Results

  • 1. 2011 Threat Management Survey Global Data
  • 2. Methodology • Survey performed by Applied Research • 1,025 global enterprises • Tactical IT, Strategic IT and C-level professionals • Cross-industry 2
  • 3. Key Findings • Enterprises not confident in their security posture • Organizations struggling with timely analysis and response • Top concerns are security intelligence and visibility • Staffing problems top list of issues impacting ability to respond to new and emerging threats 3
  • 4. Security Confidence • 57% lack confidence in IT security staffs’ ability to respond to new threats • Why? Several of the factors tied to staffing – Not enough staff – Staff lacks time 4
  • 5. Staffing Issues • 66% rate staff as less than effective • Only 4% rate staff as completely effective • Why? – Recruiting – Retention – Right skill sets
  • 6. Top Security Concerns • Intelligence • Visibility • Analysis 6
  • 7. Security Shortcomings • Timely and quality alert correlation/analysis • Timely and effective event response 7
  • 8. Symantec Recommendations • Build a comprehensive incident management program • Be vigilant about the changing threat landscape • Broaden the visibility across your infrastructure • Evaluate systems for managing security information and alerts
  • 11. Q2: How many employees does your organization have in all locations worldwide? 1,000 to 2,499 33% 2,500 to 4,999 33% 5,000 or more 34% 0% 5% 10% 15% 20% 25% 30% 35% 40% 11
  • 12. Q3: What is your organization's primary industry? Advertisement 1% Media 2% Living-related and personal services and amusement services 2% Legal 2% Energy 2% Transport and freight service (cover such as Airline/railway industry) 3% Internet 3% Eating and drinking services, accommodations 3% Real estate and goods rental and leasing 4% Government 4% Education, Learning and Support 4% Construction 5% Medical, Health Care and Welfare 6% Manufacturing 9% Other 10% Wholesale and Retail 10% Scientific research, professional and technical services 10% Information Technology and Communications 10% Finance and Insurance 10% 0% 2% 4% 6% 8% 10% 12% 12
  • 13. Q4: What is your primary role? Manage our computing resources 25% Management role in IT, primarily focused on tactical/operational 25% issues Management role in IT, primarily focused on strategic issues 25% C-level or business owner 25% 0% 5% 10% 15% 20% 25% 30% 13
  • 14. Q5: What is your title? President 2% Owner 3% Partner 1% CIO 25% CTO 5% CISO 1% Vice President or Senior Vice President in a computing area 4% Director in a computing area 9% Manager of Information Systems or Computer Systems 22% Systems analyst 12% Systems architect 3% Systems designer 3% Other 11% 0% 5% 10% 15% 20% 25% 30% 14
  • 15. What is your age? 50 or older (Boomer) 10% 30 or less (Millennial) 22% 31 to 49 (Gen-X) 68% 15
  • 16. Q7: What is your gender? Female 19% Male 81% 16
  • 17. Q8: How many years have you been working in computer systems and technology? 14 12.88 12 12 10 8 6 4 2 0 Mean Median 17
  • 18. Q9: What are your company's annual revenues? Less than $500,000 2% $500,000 to $2,000,000 3% $2,000,000 to $7,500,000 4% $7,500,000 to $30,000,000 5% $30,000,000 to $100,000,000 9% $100,000,000 to $500,000,000 15% $500,000,000 to $1,500,000,000 16% $1,500,000,000 to $5,000,000,000 16% $5,000,000,000 to $25,000,000,000 16% $25,000,000,000 to $100,000,000,000 7% More than $100,000,000,000 7% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 18
  • 19. Q10: Characterize your company's year-over-year annual growth rate in terms of annual revenue: Decline to state 3% Growing at 100% per year or more 0% Growing at 50 to 99% per year 5% Growing at 25 to 49% per year 7% Growing at between 10 to 24% per year 29% Growing at between 1 to 9% per year 31% Flat: Neither growing nor declining 11% Declining at between 1 to 9% per year 4% Declining at between 10 to 24% per year 9% Declining 25% per year or greater 1% 0% 5% 10% 15% 20% 25% 30% 35% 19
  • 21. Q213: How confident are you that your IT security staff can handle new security threats in a timely and effective manner? Very confident 19% Somewhat confident 25% Neutral 19% Somewhat concerned 18% Very concerned 20% 0% 5% 10% 15% 20% 25% 30% 21
  • 22. Q214: What are the top three factors that are keeping you from being completely confident in your ability to handle new security threats in a timely and effective manner? (Ranked 1, 2, or 3) No access to latest information about new threats, vulnerabilities, etc. 36% Security staff lacks necessary experience/skill sets 39% Trouble responding to security incidents in a timely/effective manner 43% Staff doesn't have enough time 45% Trouble correlating/analyzing security alerts as they are happening 45% Not enough visibility into security across entire infrastructure 45% Insufficient security staff 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 22
  • 24. Q215: Please review the following aspects of security and rank them in terms of what concerns you the most. 100% 90% 17% 18% 24% 80% 41% 20% 70% 28% 25% 60% 1 50% 25% 2 27% 3 40% 28% 28% 4 30% 19% 20% 38% 27% 10% 23% 13% 0% Security intelligence Security visibility Attack analysis Security response 24
  • 25. Q215: Please review the following aspects of security and rank them in terms of what concerns you the most. (Average Ranks) Security intelligence Security visibility Attack analysis Security response 0 1 2 2.04 2.50 2.64 2.82 3 4 25
  • 26. Q216: Please rank these aspects in terms of your organization's ability to execute. 100% 90% 19% 17% 26% 80% 38% 21% 70% 25% 60% 26% 1 50% 24% 2 29% 3 40% 29% 4 28% 30% 19% 20% 38% 26% 10% 21% 15% 0% Security intelligence Security visibility Attack analysis Security response 26
  • 27. Q216: Please rank these aspects in terms of your organization's ability to execute. (Average Ranks) Security intelligence Security visibility Attack analysis Security response 0 1 2.10 2 2.44 2.62 2.83 3 4 27
  • 28. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 24% 27% 80% 70% 60% 41% 40% 50% 40% 30% 25% 20% 26% 10% 7% 5% 0% 3% 1% Acquiring such intelligence in a timely fashion The quality of intelligence you gather 28
  • 29. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas. (Somewhat/Extremely well) The quality of intelligence you gather 68% Acquiring such intelligence in a timely fashion 65% 0% 10% 20% 30% 40% 50% 60% 70% 80% 29
  • 30. Q217: When it comes to keeping up with the latest cyber-security vulnerabilities and threats, please rate how you are doing in the following areas. (Somewhat/Extremely poorly) The quality of intelligence you gather 6% Acquiring such intelligence in a timely fashion 10% 0% 2% 4% 6% 8% 10% 12% 30
  • 31. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 21% 22% 27% 80% 70% 60% 44% 42% 39% 50% 40% 30% 20% 27% 27% 27% 10% 6% 7% 7% 0% 1% 1% 1% The quality of that visibility Acquiring such visibility in a timely fashion How comprehensive the visibility is 31
  • 32. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) How comprehensive the visibility is 65% Acquiring such visibility in a timely fashion 65% The quality of that visibility 66% 0% 10% 20% 30% 40% 50% 60% 70% 32
  • 33. Q218: When it comes to maintaining visibility into security across the entire company's infrastructure, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) How comprehensive the visibility is 8% Acquiring such visibility in a timely fashion 8% The quality of that visibility 7% 0% 1% 2% 3% 4% 5% 6% 7% 8% 9% 33
  • 34. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 25% 27% 80% 70% 60% 42% 41% 50% 40% 30% 20% 27% 26% 10% 5% 5% 0% 1% 1% The timeliness of correlation and analysis The quality of the correlation and analysis 34
  • 35. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) The quality of the correlation and analysis 68% The timeliness of correlation and analysis 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 35
  • 36. Q219: When it comes to your organization's ability to correlate and analyze security alerts across the enterprise, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) The quality of the correlation and analysis 6% The timeliness of correlation and analysis 7% 0% 1% 2% 3% 4% 5% 6% 7% 36
  • 37. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas: 1 - Extremely poor 2 - Somewhat poor 3 - Neither poor nor well 4 - Somewhat well 5 - Extremely well 100% 90% 25% 28% 80% 70% 60% 45% 42% 50% 40% 30% 20% 24% 25% 10% 5% 5% 0% 1% 1% Ability to respond in a timely fashion The effectiveness of your response 37
  • 38. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas. (Somewhat/Extremely well) The effectiveness of your response 69% Ability to respond in a timely fashion 70% 0% 10% 20% 30% 40% 50% 60% 70% 80% 38
  • 39. Q220: When it comes to your organization's ability to respond to security events, please rate how you are doing in each of the following areas. (Somewhat/Extremely poorly) The effectiveness of your response 6% Ability to respond in a timely fashion 7% 0% 1% 2% 3% 4% 5% 6% 7% 39
  • 41. Q221: How would you characterize your security staffing levels at the current time? We are extremely overstaffed 4% We are somewhat overstaffed 11% We have just enough security staff 41% We are somewhat understaffed 32% We are extremely understaffed 11% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 41
  • 42. Q222: Overall, how would you rate the effectiveness of your IT security staff? Completely effective 10% Mostly effective 42% Not as good as we would like, but not horrible 24% Somewhat ineffective 15% Completely ineffective 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 42
  • 43. Q223: What is keeping you from rating your security staffing as "completely effective?" Rank the following areas of cyber security staffing in terms of difficulty for your organization. 100% 6% 17% 16% 14% 90% 19% 10% 29% 80% 14% 18% 18% 20% 70% 23% 17% 16% 1 60% 13% 18% 16% 2 50% 15% 14% 3 18% 16% 4 40% 19% 21% 5 18% 15% 30% 6 15% 22% 20% 17% 15% 12% 27% 29% 10% 15% 10% 9% 11% 0% Recruiting Retention Skill sets Experience Staff retirement Awareness 43
  • 44. Q223: What is keeping you from rating your security staffing as "completely effective?" Rank the following areas of cyber security staffing in terms of difficulty for your organization. (Average Ranks) Recruiting Retention Skill sets Experience Staff retirement Awareness 0 1 2 2.93 3.18 3 3.29 3.56 3.85 4 4.19 5 6 44
  • 45. Managed Security Service Providers 45
  • 46. Q224: What managed security service provider vendors are you considering using or do you currently use? (Mark all that apply.) Other (Please specify) 5% BT/Counterpane 16% We don't use a managed security service provider 17% Verizon Business 24% Dell/SecureWorks 29% AT&T 30% IBM/ISS 39% Symantec 40% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 46
  • 47. Q225: How much influence does your managed security service provider have over which security products your company purchases? Complete influence 13% A moderate influence 35% Neutral 28% Very little influence 14% Absolutely no influence 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 47
  • 48. SIEM 48
  • 49. Q226: What Security Information and Event Management (SIEM) vendors do you currently use? (Mark all that apply.) Other (Please specify) 1% Q1 Labs 16% We don't use a SIEM 19% EMC/RSA (enVision) 22% HP/ArcSight 34% Symantec 55% 0% 10% 20% 30% 40% 50% 60% 49
  • 50. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? 1 - Extreme impact 2 - Moderate impact 3 - Some impact 4 - Slight impact 5 - No impact whatsoever 100% 9% 10% 12% 11% 12% 11% 14% 14% 90% 80% 25% 27% 23% 24% 26% 26% 22% 24% 70% 60% 50% 28% 30% 30% 31% 28% 29% 29% 31% 40% 30% 17% 23% 23% 22% 20% 19% 21% 22% 20% 10% 19% 13% 13% 12% 14% 15% 12% 11% 0% Insufficient staff to Trouble Staff doesn't have Trouble Insufficient staff to Trouble Insufficient Insufficient set up integrating latest enough time maintaining SIEM maintain responding to training to set up training to information on rules to incidents in maintain new threats, correlate/analyze timely/effective vulnerabilities, etc. alerts in real time manner 50
  • 51. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? (Moderate/Extreme impact) Insufficient training to maintain 33% Insufficient training to set up 34% Trouble responding to incidents in timely/effective manner 34% Insufficient staff to maintain 34% Trouble maintaining SIEM rules to correlate/analyze alerts in real time 34% Staff doesn't have enough time 35% Trouble integrating latest information on new threats, vulnerabilities, etc. 36% Insufficient staff to set up 36% 0% 5% 10% 15% 20% 25% 30% 35% 40% 51
  • 52. Q227: How do the following challenges impact your ability to realize the full value of your Security Information and Event Management (SIEM) solution? (Slight/No impact) Insufficient training to maintain 36% Insufficient training to set up 38% Trouble responding to incidents in timely/effective manner 37% Insufficient staff to maintain 38% Trouble maintaining SIEM rules to correlate/analyze alerts in real time 35% Staff doesn't have enough time 35% Trouble integrating latest information on new threats, vulnerabilities, etc. 35% Insufficient staff to set up 36% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 52