Are you doing enough to fight targeted attacks?

13th August 2013 | By Mouseworld Now Correspondent |

New Delhi, India, August 13, 2013: Many organizations have turned to strengthening conventional network security “point solution” approaches to protect against threats. In 2012, organizations allocated about 24% of their overall IT security budget toward network security, and 42% of firms indicated that they expected to increase budget for network security for 2013. The majority of this network security investment is allocated to wireless security and intrusion prevention systems (IPS). In fact, 27% of organizations are planning to invest in the notoriously difficult-to-implement network access control in the coming year. However, investment strategies that put significant focus on these types of conventional technologies will do little to prevent or minimize the impact of targeted attacks.

Sharda Tickoo, PMM, Trend Micro India, said, “If organizations want to protect intellectual property and shareholder value, they must adopt advanced threat detection and response solutions that identify malicious activity quickly and enable earlier mitigation of targeted attacks.”

The lack of focus on security technologies that truly combat targeted attacks is matched by the false sense of security organizations have in their ability to deal with these attacks. A large majority (77%) of IT security decision makers are confident in their organization’s ability to thwart targeted threats today. In fact, these decision-makers claim to be almost as adept at defending against targeted attacks as they are at detecting commodity attacks. Additional Forrester survey data reveals that in the past year, 55% of organizations surveyed claim to have had no compromises or breaches. In reality, many of these organizations have been compromised but simply don’t have the technology available to detect the malicious activity. As a result, enterprises overestimate their abilities.

Targeted Attacks Require Advanced Threat Detection and Response

For this Technology Adoption Profile, Trend Micro commissioned Forrester Consulting to create a custom survey that explored key needs for network security and security operations in enterprises in the current market. Confidence — rightly or wrongly placed — in current security capabilities isn’t enough for targeted threats, and mature security organizations will recognize this fact. Targeted threat detection and response isn’t a single point solution product or technology but rather a combination of technologies and competencies that integrate into a company’s security strategy.


© Mouseworld Now News Service

Tags: , , , , ,

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 7 + 7 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • NetRack Showcases iRack Block at DCD Bangalore more...
  • Capillary Technologies to help boost Bata’s Omnichannel CRM strategies in Southeast Asia more...
  • Fox Mobiles Launches new range of Basic Keypad Phones more...
  • iValue is “APAC VAD” for Micro Focus more...
  • Telr launches its sub-brand TelrSecure more...
Subscribe via email

Enter your email address:

What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration