F5 Networks, Inc. has announced the findings of its 2013 RSA Security Trends Survey, which revealed that organisations are struggling to keep pace with the changing face of security. Respondents were RSA attendees with IT responsibilities over planning, management, oversight, or implementation of security. The results show that security trends such as virtualisation (73 percent), BYOD (66 percent), and the complexity of attack types (72 percent) have the greatest impact on securing today’s organisations. Nearly half of respondents admit that traditional safeguards are less than adequate in protecting against threats related to these trends, with roughly one-third of respondents reporting that their security readiness is inadequate.
Key Findings
Security Is Changing, From Type Of Threats To Those Driving The Threats
When asked what security trends have the greatest impact on an organisation’s ability to achieve the level of security it desires, respondents answered:
Virtualisation (73 percent)
The increasing complexity of threats (ex: Distributed Denial of Service attacks) (72 percent)
BYOD (use of employee-owned devices such as smartphones for business use) (66 percent)
The change in the bad guys (from hackers to espionage and political motivation) (62 percent)
The shift from datacentre focused infrastructure to cloud-based infrastructure (61 percent)
The shift from traditional client-server applications to web-based applications (60 percent)
**
BYOD Is Seen As Critical In An Organisation’s Ability To Achieve The Level Of Security It Desires, Yet A Sizeable Number Of Organisations Are Not Taking The Appropriate Steps To Address It**
Most (75 percent) see BYOD as being prevalent in their organisation.
Furthermore, two-thirds (66 percent) see BYOD as having a somewhat to extremely high impact on security.
Despite this, one-third (35 percent) say they are not prepared to provide adequate security to protect against threats associated with BYOD.
**
Organisations Are Unprepared To Properly Address The Shift To Web-Based Applications And Cloud-Based Infrastructure**
Nearly two-thirds (64 percent) of respondents see the shift to web-based applications as a trend affecting security, yet 37 percent of respondents’ organisations are not providing adequate security to protect against potential threats.
Sixty-six percent of respondents see the shift to cloud-based infrastructure as a trend affecting security, yet 49 percent of respondents’ organisations are not providing adequate security to protect against potential threats.
Threats Are Moving Beyond The Capability Of Traditional Security Safeguards
There is a wide range of IT trends making security more complex. Below are the percentages of respondents who felt traditional safeguards were less than adequate in protecting against threats related to a variety of current IT trends:
The shift from traditional client-server applications to web-based applications (44 percent)
The shift from datacentre focused infrastructure to cloud-based infrastructure (49 percent)
BYOD (use of employee-owned devices such as smartphones for business use) (45 percent)
Increased external threats (spam and malware) (39 percent)
The increasing complexity of threats (ex: Distributed Denial of Service attacks) (48 percent)
The change in the bad guys (from hackers to espionage and political motivation) (47 percent)
Increasing insider threats (49 percent)
“The security landscape continues to change rapidly and many organisations are struggling to properly address evolving threats,” said Mark Vondemkamp, VP of Product Management for Security at F5. “Companies will do well to proactively address trends like BYOD and cloud security, but they should also look to raise their game in terms of threat detection and mitigation. With employee behavior, business priorities, and infrastructure demands further expanding traditional threat vectors, the proper tools and procedures are essential in maintaining a healthy level of security.”
Recommendations And Best Practices
To prepare for threats posed by emerging security trends, F5 recommends organisations have:
Centralised, flexible access policy controls that provide comprehensive protection and keep users productive.
A DNSSEC solution that delivers security, improved performance, and global availability.
A secure web application firewall and comprehensive, policy-based approach to web application security in addressing emerging threats at the application level.