State of IT Cyber Defense Maturity Report

Threat, Violation and Consumerization:
Network Complexity, Exposure Diversity and Issue Velocity Challenging Security Management

This new cyber defense maturity report is now available, with findings based on survey results collected and analyzed by IDG Connect. The report reveals a range of areas that are ripe for improvement as well as incident and control trends and operational confidence.  Click below to download the full report, view the highlights in the infographic, read the press release announcement and register for a webinar featuring Bob Johnson, Vice President and Principal Analyst at IDG Connect taking place on July 31 @ 11am PDT.

IDGConnect_Survey-th
Click here to
download the report
IDGConnect_Infographic-th
Click here to view the
report infographic
IDGConnect_pressrelease-th
Click here to read the
full press release
IDGConnect_webinar-th
Click here to register
for the webinar

The complete 2014 Cyber Defense Maturity Report offers more extensive data, analysis and inference, here are some of the survey results highlights

  • 96 percent of organizations experienced a significant IT security incident in the past year, with 55 percent having two or more.
    IDG-graph1
  • 33 percent of organizations surveyed have high confidence in the likelihood that their organizations will improve their less mature security controls.
    IDG-graph2
  • Top security incidents comprised of phishing, compliance policy violations, unsanctioned device and application use, and unauthorized data access. (Below: mean scores per security incident)
    IDG-graph3
  • 40 percent reported that security management tasks are more challenging now than two years ago; specifically problem prevention, diagnosis, identification and remediation.
    IDG-graph4
  • Most frequent cited security issues were from malware and advanced threats, application and wireless security, network resource access, unsanctioned application and personal mobile device use, and data leakage.
    IDG-graph5
  • Control practices indicated as relatively immature were personal mobile device usage, perimeter threats, inventory management and endpoint compliance, virtualization security, rogue device and application security. However, only 54 percent of respondents said they were somewhat confident in the likelihood of improvement over the next 12 months.
  • Over 61 percent cited low to no confidence on network device intelligence, maintaining configuration standards and defenses on devices, and ensuring virtual machine and remote devices adhere to policy.
  • The top five security technologies perceived to have the greatest interoperability value were firewalls, anti-malware, network access control (NAC), mobile device management (MDM), and advanced threat detection (ATD).
    IDG-graph8

Click here to download the full report

* IDGConnect, ForeScout Technologies – State of IT Cyber Defense Maturity Report, July 2014.