Report: IT Security Pros Shifting Investments as Attacks Rise

Report: IT Security Pros Shifting Investments as Attacks Rise

Never before have we seen a higher rate of ransomware, malware and phishing attacks with our customers. These attacks are both very real and very targeted, triggering painful, real-world consequences.

We were naturally curious, then, when Citrix released the results of a network security survey among its customers. As a Citrix Platinum Partner, we’re pleased to see responses validate what we are seeing in the client environment, but also concerned about some of the implications.

The main takeaway:

Businesses must shift away from protecting devices and focus on security applications and data protection wherever their data resides (or travels) throughout the enterprise.

The condensed version:

  • More than half of Citrix customers reported they are changing the way their SecOps teams operate because of the rise in ransomware, targeted malware and phishing attacks.
  • Nearly half said end-to-end protection of apps and data is most important in protecting their “always-on” business.
  • 56% are looking more closely at how to simplify management and monitoring of SSL certificates.

In the press release that followed its report, Citrix also points out highlights of a July 2016 Forrester Security Business Technographics survey, for added perspective:

  • 62% of security decision makers hope to accelerate their digital business in the next 12 months.
  • 65% want to improve application security capabilities and services.
  • 47% are implementing or expanding IoT security in the next 12 months.

The issue at hand:

Targeted attacks are changing IT security modus operandi and investments. Citrix explains it like this:

“Devices are accessing information all the time—over public networks, across geographic boundaries and from the cloud—requiring IT to rethink their security and compliance approach… Businesses want to adopt new technology, but are still stuck catching up on compliance regulations. By shifting away from device-level, platform-specific endpoint security solutions, businesses can more easily achieve compliance and focus on adopting new technology to improve employee productivity and reduce risk to sensitive business information.”

The survey results:

Q: What is your top application security business priority? 

Management, visibility and analytics to make more efficient, informed business decisions20%
Protection against web app attack vendors12%
Moving from SSL to TLS to enhance security3%
Securing cloud deployments8%
Access management16%
All of the above40%

Q: What do you think is most important to protecting the apps & data of your always-on business?

Secure, fast cloud data access9%
Prevention of shadow IT5%
Stopping data center infiltration / data exfiltration from a variety of attack vectors22%
Malware protection8%
End-to-end protection of apps and data49%
Efficient, secure cloud deployment5%
Other2%

Our take: These responses indicate customers are not only looking for end-to-end protection for their apps and data, but since no other option ranked anywhere close to this 49% response, customers are seeking an all-encompassing solution, if possible—not individual point solutions for specific threats.

Q: As your business moves more data to cloud environments, what are your top priorities in securing your company’s data?

Keeping data secure in transit61%
Appropriate access levels57%
Policy enforcement to meet compliance regulations61%
Accurate, real-time monitoring and reporting39%
Managing and visibility of traffic and analytics43%

Our take: While these responses are relatively high-ranking, the first three, collectively, indicate customers are emphasizing regulatory compliance, which goes hand-in-hand with granular access levels. They are also concerned with the data “in flight.”

In short, they want a solution that lets them configure granular access control (so they can demonstrate regulatory compliance), and at the same time have assurance that their data is secure while in transit.

Reading between the lines, this may involve a granular policy engine governing apps and data access; additional security access barriers (such as two-factor authentication); and the use of strong TLS encryption for in-flight data.

Q: Are you looking for protection against specific attack vectors? Select all that apply. 

DDoS55%
Web firewall attacks56%
Malware75%
Ransomware75%
Phishing60%
Efficient, secure cloud deployment5%
Blacklisted IPs34%

Q: Which network security technologies are currently in use or planned for acquisition (within 12 months) to guard all network assets against cyber threats? Select all that apply.

Advanced malware analysis / sandboxing44%
Data loss/leak prevention (DLP)46%
Denial of service (DoS/DDoS) prevention48%
Network behavior analysis (NBA)27%
Next-generation firewall (NGFW)47%
Secure email gateway (SEG)52%
Secure web gateway (SWG)49%
Security analytics / full-packet capture and analysis27%
Security information and event management (SIEM)39%
Threat intelligence service34%
Web application firewall (WAF)44%

Our take: We’re surprised to see any responses below 50% in this category. Without a Next Gen Firewall, you really aren’t protecting your network from today’s threats. Similarly, be sure to analyze your Secure Email Gateway and make sure you have Advanced Threat Protection functions against phishing attacks, and include Sandboxing technologies.

Q: Has the increase in ransomware, targeted malware and phishing attacks changed security operations at your company in the last three months? 

Yes51%
No49%

Our take: We find these responses alarming. As mentioned earlier, we, too, have seen a sharp rise in attacks first-hand, which makes the ability to restore corrupted or missing files at a moment’s notice even more critical.

Additionally, businesses should take immediate action to shield themselves from this type of infiltration to begin with. Next Generation Firewalls, Application Firewalls, and partitioning of internal networks segregating users and data centers are all steps in the right direction.

Q: Given recent attacks, are you looking more closely at how to simplify management and monitoring of SSL certificates?

Yes56%
No44%

All things considered, “physical assets are disposable,” says Citrix. As businesses embrace the cloud, IoT and analytics, “they will need to shift their thinking away from protecting each device to securing sensitive applications and data.”

In an increasingly connected marketplace, it’s no exaggeration to say the future of your business hinges on the health and integrity of your data, wherever it may travel.

About Cory Adams

Cory Adams is Marketing Manager at Innovative and has spent nearly two decades in the technology industry – developing vendor alliances, building agent channels, and creating lasting relationships as a trusted consultant to clients nationwide.

Leave a Reply

Innovative Integration can help you optimize your IT infrastructure. Request a Consultation