the 2017 cyber security reality - vmware€¦ · top security market trends pose challenges...

1
An IDC Infographic, Sponsored by VMware THE 2017 CYBER SECURITY REALITY What You Need to Know Now Today’s Daunting Cyber Security Reality Security professionals must deal with threats posed by the: Death of the perimeter Sophistication of cyber miscreants Proliferation of security tool sets Scarcity of qualified information security professionals Growing number of environments and devices to protect Top Security Market Trends Pose Challenges increasingly sophisticated malware and targeted attacks compliance Driven by automation, integration, and visibility Requires to preparation Breach prevention security as a (cloud) service Positions Driven by Security professionals also grapple with: A Dynamic Threat Landscape 1. Regulatory Standards 2. Digital Transformation 3. security as risk mitigation Positions forensic and continuous audit capability Requires the business to compete in digital era Driven by security to manage and defend an increased attack surface Positions innovation to support new platforms Requires Obstacles to Improving Security 32% 26% 21% 21% 20% 19% 18% 18% 17% Budget constraints Skills shortages Juggling conflicting priorities Operations resources too busy with routine operations Fragmentation or lack of integration of security product portfolio Not enough integration into IT infrastructure teams Competing with cloud resources used and/or shadow IT High level of demand for new business services Lack of insight into security-sensitive activities Source: IDC WE European IT Security Strategies Survey, April 2017 Note: Respondents could choose up to three answers Complex IT Architecture Inhibits Security Execution Complexity rules in security deployments: Source: IDC WE European IT Security Strategies Survey, April 2017 +50% of respondents say a breach would prompt them to switch organizations. +75% would switch if impacted directly. Threat Breach Stay Source: Measuring U.S. Privacy Sentiment: An IDC Special Report, January 2017 Lapses in Cybersecurity Measures Have Real Costs All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of VMWare’s products or strategies. Stay 78% Go 22% 45% 55% Go B a s i c 18% 82% C o m p l e x From the Sponsor Learn more about VMware’s cyber security solutions by visiting www.vmware.com/go/cybersecurity

Upload: others

Post on 20-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THE 2017 CYBER SECURITY REALITY - VMware€¦ · Top Security Market Trends Pose Challenges increasingly sophisticated malware and targeted ... Security professionals also grapple

An IDC Infographic, Sponsored by VMware

THE 2017 CYBER SECURITY REALITY

What You Need to Know Now

Today’s Daunting Cyber Security RealitySecurity professionals must deal with threats posed by the:

Death of the perimeter

Sophistication of cyber miscreants

Proliferation of security tool sets

Scarcity of quali�ed information security professionals

Growing number of environments and devices to protect

Top Security Market Trends Pose Challenges

increasingly sophisticated malware and targeted attacks

compliance

Driven by

automation, integration, and visibility

Requiresto preparationBreach prevention

security as a (cloud) service

Positions

Driven by

Security professionals also grapple with:

A Dynamic Threat Landscape1.

Regulatory Standards2.

Digital Transformation3.

security as risk mitigation

Positions

forensic and continuous audit capability

Requires

the business to compete in digital era

Driven by

security to manage and defend an increased attack surface

Positions

innovation to support new platforms

Requires

Obstacles to Improving Security

32%

26%

21%

21%

20%

19%

18%

18%

17%

Budget constraints

Skills shortages

Juggling con�icting priorities

Operations resources too busywith routine operations

Fragmentation or lack of integration of security

product portfolio

Not enough integration intoIT infrastructure teams

Competing with cloud resources used and/or shadow IT

High level of demand for

new business services

Lack of insight into security-sensitive activities

Source: IDC WE European IT Security Strategies Survey, April 2017 Note: Respondents could choose up to three answers

Complex IT Architecture Inhibits Security Execution

Complexity rules in security deployments:

Source: IDC WE European IT Security Strategies Survey, April 2017

+50% of respondents say a breach would prompt them to switch organizations.

+75% would switch if impacted directly.

Threat Breach

Stay

Source: Measuring U.S. Privacy Sentiment: An IDC Special Report, January 2017

Lapses in Cybersecurity Measures Have Real Costs

All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of VMWare’s products or strategies.

Stay

78% Go

22%

45%55%Go

Basic

18%

82%Com

plex

From the Sponsor Learn more about VMware’s cyber security solutions

by visiting www.vmware.com/go/cybersecurity