Top Banner
1 2015 VORMETRIC INSIDER THREAT REPORT Research Analyzed by Research Conducted by Trends and Future Directions in Data Security GLOBAL EDITION # 2015InsiderThreat EXECUTIVE PERSPECTIVE
8

Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

Feb 03, 2018

Download

Documents

trandat
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

1

2015VORMETRICINSIDERTHREATREPORT

ResearchAnalyzed by

ResearchConducted by

Trends and Future Directions in Data SecurityGLOBAL EDITION #2015InsiderThreat

EXECUTIVE PERSPECTIVE

Page 2: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

2

89%34%

92%

of respondents believe they are at risk

are looking to increase or maintain existing spending on IT security and data protection

are very or extremely vulnerable

INSIDER THREATS: THE HIDDEN RISKS WITHIN YOUR ORGANIZATION.

In the past year, data breaches of all kinds have been widespread. The fallout has been serious and widely publicized. Household names such as Home Depot, JP Morgan, Target, Vodafone, and Sony have suffered breaches and a loss of public trust. To predict future

trends in data security and uncover insights into insider threats, Vormetric engaged Harris Poll to perform an online survey and independantly analyze over 800 senior business and IT professionals across Asia, Europe and North America, with global analyst firm Ovum to independently analyze their responses. Here’s what we found:

Page 3: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

3

TODAY, COMPANIES MUST PROTECT THEMSELVES AS MUCH FROM COMPROMISED INSIDER CREDENTIALS AS THEY DO FROM TRADITIONAL INSIDER THREATS.

In addition to those who normally have access to your network and data—

ordinary employees, IT staff with privileged access, suppliers, contractors, third-party service providers, and others—insider threats also include outsiders who have stolen valid user credentials.

THE MOST DANGEROUS INSIDERS HAVE PRIVILEGED ACCESS.

All user groups with internal access to business systems should be monitored, and their access should be appropriate and no more than they need to fulfill their specific roles. Currently only 58% of organizations have technology in place that enables them to control privileged users and only 56% monitor and audit privileged user activities.

While 71% of IT decision makers were worried about mobile device protection, these devices hold only 21% of sensitive data. However, anywhere data is being held, it is important to know and be able to prove who is getting access and what they are doing with that access.

THE SPECTRUM OF INSIDER THREATS

TRADITIONALINSIDERS PRIVILEGED

USERS

HACKERS ACTIVELY TARGETINGINSIDER ACCOUNTS

POROUSPERIMETERS

BIG DATA

CLOUD/SAAS

NATIONSTATES

CRIMINALHACKERS

WHERE’S THE RISK?

HIGHEST VOLUMES OF SENSITIVE DATA

49%DATABASES

39%FILE SERVERS

36%CLOUD

Page 4: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

4

DATA BREACH PROTECTION HAS REPLACED COMPLIANCE AS THE NUMBER ONE PRIORITY.

Over 40% of organizations reported that they had either experienced a data breach or failed a security audit in the last year. Sony, Target, and Vodafone were all compliant at the time they suffered a data breach.

PROTECTING CORPORATE DATA REMAINS THE TOP PRIORITY IN CLOUD AND BIG DATA OPERATIONS.

Continued growth in cloud and big data has introduced new security concerns due to increased volume of sensitive data, the distributed nature of that data, a lack of control over the data, and the growing number of users who need to access it. This is a new extension of the ongoing balancing act between business efficiency and security.

The combination of encryption, access control and data access monitoring is critical to using and protecting sensitive information in cloud and big data environments. 54% of respondents plan to increase their security spend to deal with insider threats.

IN THE US, WHICH DATA STORAGE LOCATIONS PUT THE ENTERPRISE AT THE GREATEST RISK FOR LOSS OF SENSITIVE DATA?

UNITED STATES

46% CLOUD

31% BIG DATA

Page 5: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

5

54% OF RESPONDENTS PLAN TO INCREASE THEIR SECURITY SPENDING TO DEAL WITH INSIDER THREATS.

The key is to focus available funds on risk-based strategies, including protecting sensitive data, monitoring and reporting on usage, and controlling user access.

RECOMMENDATIONS FOR IMPLEMENTING AN INSIDER THREAT STRATEGY:

• Becausepoint-basedsecuritysolutionsarealreadyfailingtodetectadvancedattacksusingemployee credentials and data theft by legitimate users, a layered defense combining traditional as well as advanced data protection techniques is the path forward.

• Dataprotectioninitiativesneedtofollowthedata—protectingdata-at-restwhereveritresides.For most organizations, this will involve protecting data held in both traditional environments (on-premise databases and servers) as well as newer big data applications and data used in public, private and hybrid cloud implementations.

• Companiesshouldintegratedata-at-restencryptiontechnologythatminimizesoperationalimpact and that works with strong access controls and key management for all important data sources.

• Implementingintegrateddatamonitoringandtechnologiessuchassecurityinformationandevent management (SIEM) systems to identify data usage and unusual and malicious access patterns is critical to maximizing security.

• Tokeepthewholeorganizationsafe,companiesmustdevelopanintegrateddatasecuritystrategy that includes monitoring, relevant access control, and levels of data protection, and leaves security to the CISO, not the boardroom.

WHEN IT COMES TO SETTING IT SECURITY SPENDING PRIORITIES,ORGANIZATIONS ARE MOST CONCERNED WITH:

50% PREVENTING A DATA BREACH INCIDENT

44% PROTECTION OF CRITICAL IP

41% PROTECTION OF FINANCES AND OTHER ASSETS

32% FULFILLING REQUIREMENTS FROM CUSTOMERS, PARTNERS AND PROSPECTS

32% FULFILLING COMPLIANCE REQUIREMENTS AND PASSING AUDITS

DATA BREACH

DATA AT REST PROTECTIONS IN USE TODAY

26%TOKENIZATION

43%APPLICATION

LAYER ENCRYPTION

56%DATABASE/FILE

ENCRYPTION

37%DATA MASKING

52%DATA ACCESSMONITORING

Page 6: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

6

Those who wish to steal and destroy data are increasingly sophisticated. The damage done by these adversaries transcends the narrow financial impact of a data breach and has substantial impact to an organization’s brand. The data breach, once an issue for the “IT and security guys” is now a board level issue impacting corporate brand and executive careers. Organizations that focus their security spending on protecting data at the source, implementing data monitoring technologies, and developing an integrated security strategy that includes data-at-rest encryption technologies will have greater success protecting their business.

To read the full 2015 Vormetric Insider Threat Report—Global Edition, please visit www.vormetric.com/InsiderThreat/2015.

ANALYST PROFILE—ANDREW KELLETT, PRINCIPAL ANALYST SOFTWARE—IT SOLUTIONS, OVUM

Andrew enjoys the challenge of working with state-of-the-art technology. As lead analyst in the Ovum IT security team, he has the opportunity to evaluate, provide opinion, and drive the Ovum security agenda, including its focus on the latest security trends. He is responsible for research on the key technologies used to protect public and private sector organizations, their operational systems, and their users. The role provides a balanced opportunity to promote the need for good business protection and, at the same time, to research the latest threat approaches.

Andrew Kellett Principal Analyst Software IT Solutions, Ovum

Page 7: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

7

OUR SPONSORS

HARRIS POLL—SOURCE/METHODOLOGY

Vormetric’s 2015 Insider Threat Report was conducted online by Harris Poll on behalf of Vormetric from September 22-October 16, 2014, among 818 adults ages 18 and older, who work full-time as an IT professional in a company and have at least a major influence in decision making for IT. In theU.S.,408ITDMsweresurveyedamongcompanieswithatleast$200million in revenue with 102 from the health care industries, 102 from financial industries, 102 from retail industries and 102 from other industries. Roughly 100ITDMswereinterviewedintheUK(103),Germany(102),Japan(102),andASEAN(103)fromcompaniesthathaveatleast$100millioninrevenue.ASEAN countries were defined as Singapore, Malaysia, Indonesia, Thailand, and the Philippines. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated.

ABOUT VORMETRIC

Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetrichelpsover1500customers,including17oftheFortune30,tomeetcompliance requirements and protect what matters—their sensitive data—from bothinternalandexternalthreats.Thecompany’sscalableVormetricDataSecurity Platform protects any file, any database and any application’s data—anywhere it resides—with a high performance, market-leading solution set.

Page 8: Research Conducted by Analyzed by 2015 VORMETRIC …enterprise-encryption.vormetric.com/rs/vormetric/images/CW_2015... · 2015 VORMETRIC INSIDER THREAT REPORT Research ... access

8

2015 VORMETRIC INSIDER THREAT REPORT —GLOBAL EDITION

Vormetric.com/InsiderThreat/2015

© 2015 Vormetric, Inc. All rights reserved.

EXECUTIVE PERSPECTIVE