Monday, April 22, 2013

ORGANIZATIONS IN INDIA NOT CONFIDENT IN DETECTING AND PREVENTING SECURITY THREATS: PONEMON INSTITUTE REPORT

 Juniper Networks, the industry leader in network innovation, today announced the findings of a new Ponemon Institute report, which revealed that on average the security posture of Indian organizations surveyed is only 4.7 based on a scale of 10 being very effective.

The Efficacy of Emerging Network Security Technologies study, commissioned globally by Juniper Networks, shows securing web traffic is by far the most significant network security concern for the majority of organizations (64 percent) surveyed. However, less than half (46 percent) of respondents agreed that emerging network security technologies are not as effective as they should be and do not minimize attacks that bring down web applications or block unwarranted Internet traffic.

Highlights:

This report uncovered key concerns and security threats that the 554 Indian IT and IT security professionals surveyed encounter at their companies on a daily basis, with theft of their organization’s intellectual property being one of the top security concerns that keeps them up at night.

Organizations believe that their emerging network technologies only partly address their security concerns

·         63 percent of those surveyed say emerging network security technologies only address part of the security threats facing their organizations.

·         Majority of the respondents (55 percent) surveyed say that their organizations prioritize emerging network security technologies to curtail inside-out threats rather than a more holistic approach to security.

·         50 percent say blocking of IP addresses in not an effective security measure.



Organizations are critical of their network security posture; rate them below average in detecting and preventing cyber attacks

·         On average, respondents say the security posture of their organization is only 4.7 based on a scale of 10 being very effective.

·         52 percent of the respondents say emerging network security technologies used by their organizations are dependent upon the in-house personnel who possess the knowledge and expertise to operate them effectively.

·         Respondents rated their organizations’ ability to quickly detect and prevent cyber-attacks as fair or 4.8 and 4.6, respectively, on a scale of 10 being excellent.



Efficacy of emerging network security technologies is influenced by the complexities involved in configuring policies for WAF

·         Only half of the respondents say their organizations use emerging network security technologies to heighten visibility to applications and the use of cloud services.

·         Respondents surveyed do not deploy or are unsure about Web Application Firewalls (61 percent) (WAFs) because they think it might affect revenues as the high incidence of false positives may block legitimate customer traffic.

·         Majority (79 percent) of the respondents say that is takes them at least a few weeks to configure and update rules or policies for WAF.



To effectively secure data centers Juniper Networks believes companies must have knowledge of the attacking devices, not just the IP address, and quickly disseminate that intelligence across the data center and into the network. Juniper Networks can deliver this intelligence through its Junos® Spotlight Secure global attacker intelligence service, which acts as the consolidation point for attacker and threat information, feeding real-time intelligence to Juniper’s security solutions. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks® SRX Series Services Gateways.



The Ponemon Report surveyed 4,774 IT and IT security practitioners across the United States, Australia, United Kingdom, Germany, France, India, Japan, China and Brazil. In India, 554 IT and IT security practitioners took part in the 2013 study.


Supporting Quotes:

Juniper Networks
“Security remains a major concern among organizations. The Ponemon Institute report reveals that even emerging network security technologies are not as effective as they should be. Companies need to review their security investment weighting, to assess whether the areas of greatest risk are receiving adequate attention and how they can address serious security threats”.
-          Ravi Chauhan, managing director India and SAARC, Juniper Networks


Ponemon Institute
“Respondents in Australia, China, India and Japan share common challenges in securing their organizations’ networks such as web-based attacks and denial of service attacks. It is interesting to observe that despite being armed with emerging network security technologies, organizations in Asia Pacific find themselves to be sitting ducks for external threats. Organizations need to reflect on the shortcomings of their existing inside-out approach and seriously consider investing in a more comprehensive and holistic approach to network security in order to keep pace with a constantly evolving threat landscape.”

-           Larry Ponemon, Ph.D., chairman and founder, Ponemon Institute



Additional Resources
·         Ponemon Study: Emerging Technology Under the Spotlight Blog by Johnnie Konstantas
·         Ponemon Study Report Download: Efficacy of Emerging Network Security Technologies
·         Deconstructing Web Attack Trends in 2012 Blog by Kyle Adams
Spotlight Secure Global Attacker Intelligence Service: First System for Fingerprinting Cyber Attackers Blog by David Koretz



About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

About Ponemon Institute
The Ponemon Institute® is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.