Are you doing enough to fight targeted attacks?

13th August 2013 | By Mouseworld Now Correspondent |

New Delhi, India, August 13, 2013: Many organizations have turned to strengthening conventional network security “point solution” approaches to protect against threats. In 2012, organizations allocated about 24% of their overall IT security budget toward network security, and 42% of firms indicated that they expected to increase budget for network security for 2013. The majority of this network security investment is allocated to wireless security and intrusion prevention systems (IPS). In fact, 27% of organizations are planning to invest in the notoriously difficult-to-implement network access control in the coming year. However, investment strategies that put significant focus on these types of conventional technologies will do little to prevent or minimize the impact of targeted attacks.

Sharda Tickoo, PMM, Trend Micro India, said, “If organizations want to protect intellectual property and shareholder value, they must adopt advanced threat detection and response solutions that identify malicious activity quickly and enable earlier mitigation of targeted attacks.”

The lack of focus on security technologies that truly combat targeted attacks is matched by the false sense of security organizations have in their ability to deal with these attacks. A large majority (77%) of IT security decision makers are confident in their organization’s ability to thwart targeted threats today. In fact, these decision-makers claim to be almost as adept at defending against targeted attacks as they are at detecting commodity attacks. Additional Forrester survey data reveals that in the past year, 55% of organizations surveyed claim to have had no compromises or breaches. In reality, many of these organizations have been compromised but simply don’t have the technology available to detect the malicious activity. As a result, enterprises overestimate their abilities.

Targeted Attacks Require Advanced Threat Detection and Response

For this Technology Adoption Profile, Trend Micro commissioned Forrester Consulting to create a custom survey that explored key needs for network security and security operations in enterprises in the current market. Confidence — rightly or wrongly placed — in current security capabilities isn’t enough for targeted threats, and mature security organizations will recognize this fact. Targeted threat detection and response isn’t a single point solution product or technology but rather a combination of technologies and competencies that integrate into a company’s security strategy.

 

© Mouseworld Now News Service

Tags: , , , , ,

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 13 + 6 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • Rashi Peripherals Bags Indywood IT Excellence Award more...
  • Rashi Peripherals Conducts Multi-City Enterprise Partner Meet more...
  • Second Edition of Annual 4.5G & 5G Innovation Summit concludes on a successful note more...
  • Wydr launches India Wholesale E-Fair more...
  • Snapdeal clocks record 3x growth in Kids Category more...
Subscribe via email

Enter your email address:

Follow us on Facebook
QUESTION HOUR
What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration