Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Survey: Despite Increased Budgets, IT Security Struggles Remain

While an increasing portion of IT budgets are being allocated towards security, 70 percent of respondents in a recent IT security survey said they have been impacted by security breaches and still struggle to mitigate attacks due to limited time and resources.

While an increasing portion of IT budgets are being allocated towards security, 70 percent of respondents in a recent IT security survey said they have been impacted by security breaches and still struggle to mitigate attacks due to limited time and resources.

The study, conducted by Harris Interactive, for NetIQ (which recently took over Novell’s Identity & Security Portfolio) revealed that nearly eight in ten (77 percent) respondents indicated IT security budgets are higher this year compared to last.

Fifty-five percent of respondents admitted to not having the ability to manage security in virtualized and cloud environments and are least confident in their ability to successfully monitor and secure consumer devices, such as smart phones and tablets.

The 200 IT security decision makers within enterprise organizations surveyed revealed that:

Approximately eight in ten experienced the following in the past two years:

• Malware (76 percent)

• Lost/stolen equipment (75 percent)

• External data theft (74 percent)

Advertisement. Scroll to continue reading.

• Insider data theft (72 percent)

Respondents cited the following as their most difficult challenges:

• Lack of time to monitor vast amounts of data (64 percent)

• Inability to manage security in the cloud (55 percent)

• Inability to manage security in virtualized environments (54 percent)

While survey participants overwhelmingly stated that security solutions have improved in recent years, the amount of stolen data validates that there is still considerable room for improvement:

• Nearly all respondents agree today’s IT security solutions are better than those of five years ago. Four in 10 (44 percent) believe they are “much better.”

• While 65 percent of respondents say they use an identity management solution, external and internal data theft remains high.

“We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it an ongoing challenge for IT security teams to protect corporate data,” said Jay Roxe, Solution Marketing director, NetIQ. “Organizations must be able to monitor activity across multiple environments, proactively identify and mitigate security threats in real time and allow for meaningful data analysis so that proactive controls can be implemented. By requiring these components, IT security teams can make better use of their resources, tackle the integration of new platforms and technologies and ultimately reduce organizational cost and risk.”

Results of the study are available here.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem