Connect with us

Hi, what are you looking for?

HEADLINES

Complex environments are second most prominent security concern following second year of pandemic

According to a study by McKinsey & Company, companies have accelerated the digitization of their customer and supply-chain interactions along with the share of digital or digitally-enabled products in their portfolios. This required massive adoption of new IT services and changes to IT infrastructure.

The cost of securing increasingly complex environments has soared to second place in the top challenges IT leaders say their businesses are facing in 2021. That is up from third place last year and sixth place in 2018, according to the latest Kaspersky ‘IT Security Economics’ report. With digitalization, remote work and cloud usage growth, this complexity may impact organizations’ visibility of threats and incident response.

2020 saw lockdowns and remote work stimulate the use of digital technologies in businesses. According to a study by McKinsey & Company, companies have accelerated the digitization of their customer and supply-chain interactions along with the share of digital or digitally-enabled products in their portfolios. This required massive adoption of new IT services and changes to IT infrastructure. 

Businesses had to ensure the safety of all these innovations, which became a real challenge for almost half of all companies (44%). Only data protection was higher – the concern that has stayed in first place for several years already. The cost of securing complex environments turned out to be even more crucial than ensuring compliance with security policies which stayed in second place for the last two years. 

Cloud adoption has also contributed to IT infrastructure complexity. According to Kaspersky’s study, in 2020-2021, the use of all types of cloud, including public and private ones, has grown to 88%, compared with only 72% in 2019. In addition, virtual desktop infrastructure, which should have helped companies organize remote access to corporate workspaces to work safely from home, increased from 82% to 86%. 

Advertisement. Scroll to continue reading.

The problem with complex infrastructure is not only that it is difficult to roll out security tools. It makes it much more difficult to track down the signs of an attack and respond to it in a timely way to minimize the possible damage. In fact, lack of visibility over the infrastructure is the most common challenge (41%) organizations face when dealing with complex threats. 

Fortunately, the issue stimulates investment. Almost half (47%) of enterprises named the increased complexity of their IT infrastructure as the top reason to increase their IT security budget (compared to 43% in 2020). 

“When it comes to corporate cybersecurity, the matter is not only related to ever-evolving threats. A heterogeneous and constantly changing corporate IT infrastructure further increases the stakes. On one hand, it complicates the very process of protection; on the other, the consequences of a successful attack may be much more difficult to address. Fortunately, the cybersecurity industry doesn’t standstill. The most up-to-date threat intelligence and solutions for detection and response should help organizations undertake the challenge and embrace any innovations for their business growth,” says Sergey Martsynkyan, VP, Corporate Product Marketing at Kaspersky.

To protect complex infrastructure, with cloud and on-premises workloads, VDI (Virtual Desktop Infrastructure) and remote workforce, organizations should look for a solution with strong detection and response capabilities. The solution should give visibility of threats in any endpoint with background information about malicious activity and options for response actions. Kaspersky Hybrid Cloud Security -— which includes updated Kaspersky Security for Virtualization Light Agent, dedicated to the protection of virtualized environments and VDI -— now integrates with Kaspersky Endpoint Detection and Response Optimum, Kaspersky Sandbox, and Kaspersky Anti Targeted Attack Platform. Together with endpoint security, they ensure essential protection for the infrastructure of any complexity.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

This rollout resulted in 5G coverage reaching 98.69% of the National Capital Region and 96.95% of key cities throughout the Visayas and Mindanao, now serving approximately...

HEADLINES

Under the agreement, Visa will utilize its innovation in digital payments as well as its global payments network to explore opportunities with PHLPost in...

HEADLINES

At ING Hubs Philippines, investing in people is key to driving innovation. Through strategic development programs, ING ensures its workforce remains future-ready, equipped with...

HEADLINES

For Bossjob Growth Director Feby Llosala-Luneza, the expansion of Bossjob’s services into Legazpi City is a step forward in its mission to empower job...

HEADLINES

Ultra is built using Apple’s innovative UltraFusion packaging architecture, which links two M3 Max dies over 10,000 high-speed connections that offer low latency and...

HEADLINES

Since its launch in 2018, Call for Code has rallied developers globally to come together and create innovative solutions to help solve the world's...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

Catch j-hope’s electrifying performance and share your real-time experience of the ‘HOPE ON THE STAGE’ in MANILA for two straight nights, powered by Smart...

Advertisement