Connect with us

Hi, what are you looking for?

HEADLINES

Complex environments are second most prominent security concern following second year of pandemic

According to a study by McKinsey & Company, companies have accelerated the digitization of their customer and supply-chain interactions along with the share of digital or digitally-enabled products in their portfolios. This required massive adoption of new IT services and changes to IT infrastructure.

The cost of securing increasingly complex environments has soared to second place in the top challenges IT leaders say their businesses are facing in 2021. That is up from third place last year and sixth place in 2018, according to the latest Kaspersky ‘IT Security Economics’ report. With digitalization, remote work and cloud usage growth, this complexity may impact organizations’ visibility of threats and incident response.

2020 saw lockdowns and remote work stimulate the use of digital technologies in businesses. According to a study by McKinsey & Company, companies have accelerated the digitization of their customer and supply-chain interactions along with the share of digital or digitally-enabled products in their portfolios. This required massive adoption of new IT services and changes to IT infrastructure. 

Businesses had to ensure the safety of all these innovations, which became a real challenge for almost half of all companies (44%). Only data protection was higher – the concern that has stayed in first place for several years already. The cost of securing complex environments turned out to be even more crucial than ensuring compliance with security policies which stayed in second place for the last two years. 

Cloud adoption has also contributed to IT infrastructure complexity. According to Kaspersky’s study, in 2020-2021, the use of all types of cloud, including public and private ones, has grown to 88%, compared with only 72% in 2019. In addition, virtual desktop infrastructure, which should have helped companies organize remote access to corporate workspaces to work safely from home, increased from 82% to 86%. 

Advertisement. Scroll to continue reading.

The problem with complex infrastructure is not only that it is difficult to roll out security tools. It makes it much more difficult to track down the signs of an attack and respond to it in a timely way to minimize the possible damage. In fact, lack of visibility over the infrastructure is the most common challenge (41%) organizations face when dealing with complex threats. 

Fortunately, the issue stimulates investment. Almost half (47%) of enterprises named the increased complexity of their IT infrastructure as the top reason to increase their IT security budget (compared to 43% in 2020). 

“When it comes to corporate cybersecurity, the matter is not only related to ever-evolving threats. A heterogeneous and constantly changing corporate IT infrastructure further increases the stakes. On one hand, it complicates the very process of protection; on the other, the consequences of a successful attack may be much more difficult to address. Fortunately, the cybersecurity industry doesn’t standstill. The most up-to-date threat intelligence and solutions for detection and response should help organizations undertake the challenge and embrace any innovations for their business growth,” says Sergey Martsynkyan, VP, Corporate Product Marketing at Kaspersky.

To protect complex infrastructure, with cloud and on-premises workloads, VDI (Virtual Desktop Infrastructure) and remote workforce, organizations should look for a solution with strong detection and response capabilities. The solution should give visibility of threats in any endpoint with background information about malicious activity and options for response actions. Kaspersky Hybrid Cloud Security -— which includes updated Kaspersky Security for Virtualization Light Agent, dedicated to the protection of virtualized environments and VDI -— now integrates with Kaspersky Endpoint Detection and Response Optimum, Kaspersky Sandbox, and Kaspersky Anti Targeted Attack Platform. Together with endpoint security, they ensure essential protection for the infrastructure of any complexity.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Delta will feature automation technologies for production efficiency, energy infrastructure to support electrification, and clean energy solutions to reduce carbon emissions.

HEADLINES

The Open Enterprise Linux Association (OpenELA) has published enterprise Linux sources compatible with Red Hat Enterprise Linux (RHEL) 9.5.

HEADLINES

The FarmTech training kit is composed of 10 smartphones, a tablet, a SmartBro pocket Wi-Fi with Smart prepaid load cards, an outdoor projector and...

HEADLINES

PLDT and Smart's Technolab serves as a facility for the exploration and testing of new and upcoming network technologies and solutions, such as 6G,...

HEADLINES

The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well...

HEADLINES

The event emphasized the pivotal role of PLDT Enterprise’s Managed SD-WAN and Managed Network Service for businesses striving for operational excellence and digital transformation.

HEADLINES

Financial phishing attacks are rapidly increasing in the country as cybercriminals continuously evolve and adapt their tactics, making them sophisticated. The number of attacks...

HEADLINES

A Scale of Harm study by the International Justice Mission revealed that almost half a million Filipino children were trafficked to produce new child...

Advertisement