andy kicklighter - 2016 vormetric data threat report

18
2016 VORMETRIC DATA THREAT REPORT Trends in Encryption and Data Security Sponsoring Partners Andy Kicklighter Director, Product Marketing

Upload: centralohioissa

Post on 13-Apr-2017

534 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Andy Kicklighter - 2016 Vormetric Data Threat Report

2016 VORMETRIC DATA THREAT REPORTTrends in Encryption and Data Security

Sponsoring Partners

Andy KicklighterDirector, Product Marketing

Page 2: Andy Kicklighter - 2016 Vormetric Data Threat Report

2016 VORMETRICDATA THREAT REPORT

1114 IT DECISION MAKERSUS (505), UK (101), DE (100), JP (102), AUS(100), MEX (103), BRZ (103)

HealthcareRetail OtherEnterprise

FinancialServices

Enterprises of: $250M+ for US, UK, DE, JP$100M+ for BRZ, MEX, AUS

Polling and Analysis by 451 Research

100%

Government

Page 3: Andy Kicklighter - 2016 Vormetric Data Threat Report

WHY IS COMPLIANCETHE TOP CONCERN?

91% 61%VULNERABLE TO DATA THREATS

9%

61%

22%

8%

NOT VULNERABLESOMEWHATVULNERABLEVERY VULNERABLEEXTREMELY VULNERABLE

HAD A DATA BREACH

RATES OF VULNERABILITY TO DATA THREATS

Page 4: Andy Kicklighter - 2016 Vormetric Data Threat Report

COMPLIANCE DOES NOT EQUALDATA BREACH PREVENTION

64%46%

BELIEVE COMPLIANCE IS EFFECTIVE AT PREVENTING DATA BREACHES

Compliance does not ensure security”..being compliant does not mean you won’t be breached”

Garrett BekkerSr. Analyst Enterprise Security, 451 Research

(58% IN THE 2015 REPORT)

RANK COMPLIANCE AS A TOP 3 IT SECURITY SPENDING PRIORITY

Rates of ranking as a Top 3 IT Security Spending Priority 39% - BEST PRACTICES

32% - PARTNERS/CUSTOMERS

46% - COMPLIANCE

46% - REPUTATION AND BRAND PROTECTION

36% - DATA BREACH AVOIDANCE

Page 5: Andy Kicklighter - 2016 Vormetric Data Threat Report

PUTTING FAITH INTHE WRONG DEFENSES

INCREASES IN IT SECURITY SPENDING PLANS BY CATEGORY

44% - ANALYSIS & CORRELATION TOOLS

48% - NETWORK DEFENSES

40% - DATA IN MOTION DEFENSES

39% - DATA AT REST DEFENSES

… perimeter defenses offer little help defending against multi-stage attacks”

“It’s no longer enough just to secure networks and endpoints”

Garrett BekkerSr. Analyst Enterprise Security, 451 Research

… data-at-rest approaches have proven to be effective at protecting the data itself”

INCREASES IN SPENDING ON DATA AT REST DEFENSES FELL

47%

2014

39%

201544% - END POINT AND MOBILE

Page 6: Andy Kicklighter - 2016 Vormetric Data Threat Report

SOME ORGANIZATIONSARE GETTING IT RIGHT

58%INCREASING SPENDING ONIT SECURITYTO PROTECT SENSITIVE DATA

NOW MAKE PREVENTING DATA BREACHES A TOP SPENDING PRIORITY

36%

IMPLEMENTING EFFECTIVE DATA SECURITY TOOLS

39% - MULTI-FACTOR AUTHENTICATION

38% - SIEM SYSTEMS

40% - APPLICATION LAYER ENCRYPTION

39% - TOKENIZATION

38% - CLOUD SECURITY GATEWAY

Page 7: Andy Kicklighter - 2016 Vormetric Data Threat Report

39%

58%

45%

35%

EXECUTIVE MANAGEMENT

CONTRACTOR ACCOUNTS

INTERNAL AND EXTERNALDATA THREATSTHE MOST DANGEROUS INSIDERS (TOP 3 SELECTION)

TOP EXTERNAL THREATS

15% 12%39% 19% 15%CYBER CRIMINALS

HACKTIVISTSCYBER-

TERRORISTS

NATION STATES

COMPETITORS

PRIVILEGED USERS

SERVICE PROVIDER ACCOUNTS

Page 8: Andy Kicklighter - 2016 Vormetric Data Threat Report

70%

DRAMATIC INCREASE IN RATESOF SENSITIVE DATA USE IN THE CLOUD

USE OF SENSITIVE DATA IN CLOUD ENVIRONMENTS

54%

2015

85%

2016CONCERNS - HIGH

VERY OR EXTREMELY CONCERNED ABOUT SENSITIVE DATA IN

THE CLOUD

DATA SECURITY USAGE - LOW 24%

USING ENCRYPTION TO SAFEGUARD CLOUD

DATA TODAY

Page 9: Andy Kicklighter - 2016 Vormetric Data Threat Report

TOP CONCERNS FOR DATAWITH ADOPTING CLOUD SERVICES70% – GLOBAL SECURITY BREACHES /

ATTACKS AT CSP75% – U.S.

66% – GLOBAL73% – U.S.

SHARED INFRASTRUCTURE VULNERABILITIES

66% – GLOBAL LACK OF DATA LOCATION CONTROL70% – U.S.

65% – GLOBAL LACK OF DATA PRIVACY POLICY / SLA71% – U.S.

64% – GLOBAL CLOUD PRIVILEGED USER ABUSE/THREATS70% – U.S.

62% – GLOBAL MEETING COMPLIANCE REQUIREMENTS69% – U.S.

Page 10: Andy Kicklighter - 2016 Vormetric Data Threat Report

66% ONLINE BACKUP67% ONLINE STORAGE

GLOBAL RATES OF VERY OR EXTREMELY CONCERNED

53% COLLABORATION TOOLS

61% CRM / SOCIAL CRM57% ERP

66% ONLINE ACCOUNTING

51% ONLINE OFFICE SUITES

56% PROJECT / TASK MANAGEMENT

DATA PROTECTION CONCERNSARE HIGH FOR ALL SAAS APPLICATIONS

Page 11: Andy Kicklighter - 2016 Vormetric Data Threat Report

WHAT CAN CSP’s DO TO INCREASE ENTERPRISE CLOUD ADOPTION?

35%DATA

ENCRYPTION IN THE CLOUD

CSP KEY CONTROL

27%EXPOSURE OF

SECURITY MONITORING

DATA

36%DETAILED

PHYSICAL AND IT SECURITY

IMPLEMENTATION INFORMATION

48%

DATA ENCRYPTION IN

THE CLOUD

ENTERPRISE PREMISE KEY

CONTROL

TOP CHANGE FROM LAST YEAR

53%DATA ENCRYPTION IN THE

CLOUD WITH CSP KEY CONTROL

35%2015 2016

Page 12: Andy Kicklighter - 2016 Vormetric Data Threat Report

RATES OF SENSITIVE DATA USEBY EMERGING TECHNOLOGY TYPE

WHILE CLOUD HAS THE HIGHEST OVERALL ADOPTION, BIG DATA AND IoT ARE ALSO EMERGING QUICKLY AS LOCATIONS WHERE SENSITIVE DATA IS PRESENT

47% - PaaS

33% - IoT

53% - SaaS

50% - BIG DATA

47% - IaaS

85%TOTAL FOR CLOUD

(ALL TYPES)

Page 13: Andy Kicklighter - 2016 Vormetric Data Threat Report

SENSITIVE DATA USE INCREASESIN BIG DATA ENVIRONMENTS

SENSITIVE DATA MAY RESIDE ANYWHERE

PRIVACY VIOLATIONS - DATA ORIGINATES IN MANY COUNTRIES

41%

42%

40%

37%

33%

SECURITY OF REPORTS THAT MAY INCLUDE SENSITIVE

DATA

LACK OF SECURITYFRAMEWORKS AND CONTROLS

PRIVILEGED USER ACCESS TO PROTECTED DATA

USE OF SENSITIVE DATA IN BIG DATA

31%

2015

50%

2016

TOP 5 CONCERNS

Page 14: Andy Kicklighter - 2016 Vormetric Data Threat Report

DOUBLE JEOPARDY

BIG DATA IS OFTEN IMPLEMENTED IN

THE CLOUD

TOP 3 SELECTIONS FOR LOSS OF VOLUMES OF SENSITIVE DATA

BIG DATA - U.S. - MORE TO LOSEWITH HIGHEST SENSITIVE DATA USE

30% 27% 21%24% 22% 12%18%U.S. U.K. MEXICOBRAZIL GERMANYAUS JAPAN

Page 15: Andy Kicklighter - 2016 Vormetric Data Threat Report

IoT THREAT AWARENESS LOWCOMPARED TO CLOUD AND BIG DATA

MANY ORGANIZATIONS HAVE STRONG CONCERNS FOR THE SAFETY OF THEIR DATA

29% - IDENTIFYING WHICH DATA IS SENSITIVE

27% - IMPACT OF ATTACKS ON IoT DEVICES

35% - PROTECTING SENSITIVE DATA GENERATED BY IOT

30% - PRIVACY VIOLATIONS

28% - PRIVILEGED USER ACCESS TO DATA AND DEVICES

33%ORGANIZATIONS THAT

EXPECT SENSITIVE DATA USE IN IoT

Page 16: Andy Kicklighter - 2016 Vormetric Data Threat Report

WHAT SHOULDORGANIZATIONS BE DOING

Get a better handle on where organization is using sensitive data – Both internal and external locations

Discover and classify

Use platform solutions that deliver a broad range of data security solutions on a single platform to reduce costs

Data security platforms

Security analytics Use data access monitoring combined with other threat indicators to identify threat activity patterns

Encryption and access control

Use encryption for more than just compliance.Data Center: Consider an Encrypt Everything policyCloud: Encrypt and manage your keys appropriatelyBig Data: Make sure encryption includes access controlIoT: Encrypt on devices, in transit and on the back end

Page 17: Andy Kicklighter - 2016 Vormetric Data Threat Report

Vormetric Data Security#DefenderOfData

VisionTo Secure the World’s Information

Purpose Protect business assets and brand

Customers1500+ Customers Across 21 Countries17 of Fortune 30 30+ Cloud and Hosting Providers

Global PresenceGlobal Headquarters - San Jose, CA, USAEMEA Headquarters - Reading, United KingdomAPAC Headquarters - Singapore

Data-at-Rest Protection ProductsTransparent Encryption, Application-layer EncryptionTokenization with Dynamic Data MaskingCloud Encryption GatewayProtection for Teradata DatabaseKey Management

Page 18: Andy Kicklighter - 2016 Vormetric Data Threat Report

Questions?

NameTitle

Contact