Connect with us

Hi, what are you looking for?

HEADLINES

Futuriom SysSecOps Reports finds major gaps in security strategies

Futuriom’s two-month study on integrated systems and security operations (SysSecOps) strategy, “Endpoint Security and SysSecOps: The Growing Trend to Build a More Secure Enterprise,” reveals that many IT and security operations managers have challenges in delivering a comprehensive information security approach, including inter-department coordination, endpoint security technology integration, and resources.

Futuriom’s two-month study on integrated systems and security operations (SysSecOps) strategy, “Endpoint Security and SysSecOps: The Growing Trend to Build a More Secure Enterprise,” reveals that many IT and security operations managers have challenges in delivering a comprehensive information security approach, including inter-department coordination, endpoint security technology integration, and resources.

The Futuriom survey of 149 IT specialists and executive managers found that 65% of respondents wanted “better management of budgets across department/silos” and 55% wanted “Better protection of endpoints.” The top challenges included lack of time/resources (71%) and business unit resistance (35%).

When the survey results are put into the context of a review of the major cited causes of recent security breaches, it’s clear that IT staff, security operations, and executive management need to work together better to create an integrated SysSecOps plan that starts with better endpoint protection, concludes the report.

“The findings show that it’s not just about building better endpoint security technology — which is certainly needed — but it’s also about executive leadership of an integrated SysSecOps plan,” said Futuriom Founder and Principal Analyst R. Scott Raynovich, the author of the report.

Advertisement. Scroll to continue reading.

Key Findings:

  • Integrated security visibility is a top challenge. Fifty-three percent of the IT and security respondents (including IT system admins, security specialists, hardware specialists, network admins, executive managers, and others), indicated a “Challenge in integration of many security tools” as a major challenge of securing their endpoint environments.
  • Security starts at the endpoint. Respondents to the survey see endpoint security technology as key, with 55% demanding better protection of endpoints as a top security goal.
  • It’s a human problem — many attacks can be stopped. A look at the major hacking events of the past five years shows that many breaches were flagged by technology – the failure came with human response.
  • Integrating existing tools is a major focus. When asked, “What would be the most helpful in improving IT security in your organization?”, end users selected “Better integration between systems management and security operations tools,” as one of the most helpful approaches.
  • Time and resource are a big challenge. A majority of the respondents to the survey (71%) said they lack time and resources to secure the environment. Thus, more efficient and prioritized operations would help.
  • Management isn’t always on the same page. Thirty-seven percent of the survey end users say conflicting IT and security goals prevented them from achieving their goals.
  • Current endpoint tools may still be inadequate. Many end users say despite the plethora of security and visibility tools at their disposal, better tools are needed.
  • Malware and Phishing remain major threats. The Verizon Data Breach Investigations Report puts malware and phishing as the cause of 51% of cyberattacks, underscoring the importance of coordinated systems and security operations.

The complete report is available at http://www.futuriom.com/news/free-research/.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

White Papers

Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing...

HEADLINES

GCash, a financial super app and cashless ecosystem, reaffirmed its commitment to trust, security, and collaboration with customers, stakeholders, and law enforcement to ensure...

HEADLINES

Senator Mark Villar recently filed a resolution seeking a senate inquiry on the trade of International Mobile Subscriber Identity (IMSI) catchers, which allow fraudsters...

HEADLINES

Under the DSA, Globe and GoTyme may share with digital bank GoTyme information about mobile numbers potentially used by fraudsters, including names, addresses, and...

HEADLINES

In 2024, Converge blocked a record 183 billion entry attempts to  683,000 URLs / domains it has registered in its system as illegal sites....

Advertisement