by April 22, 2013 0 comments

The Efficacy of Emerging Network Security Technologies study, commissioned globally by Juniper Networks, shows securing web traffic is by far the most significant network security concern for the majority of organizations (64 percent) surveyed. However, less than half (46 percent) of respondents agreed that emerging network security technologies are not as effective as they should be and do not minimize attacks that bring down web applications or block unwarranted Internet traffic.

News Highlights:

This report uncovered key concerns and security threats that the 554 Indian IT and IT security professionals surveyed encounter at their companies on a daily basis, with theft of their organization’s intellectual property being one of the top security concerns that keeps them up at night.

Organizations believe that their emerging network technologies only partly address their security concerns

· 63 percent of those surveyed say emerging network security technologies only address part of the security threats facing their organizations.

· Majority of the respondents (55 percent) surveyed say that their organizations prioritize emerging network security technologies to curtail inside-out threats rather than a more holistic approach to security.

· 50 percent say blocking of IP addresses in not an effective security measure.

 

Organizations are critical of their network security posture; rate them below average in detecting and preventing cyber attacks

· On average, respondents say the security posture of their organization is only 4.7 based on a scale of 10 being very effective.

· 52 percent of the respondents say emerging network security technologies used by their organizations are dependent upon the in-house personnel who possess the knowledge and expertise to operate them effectively.

· Respondents rated their organizations’ ability to quickly detect and prevent cyber-attacks as fair or 4.8 and 4.6, respectively, on a scale of 10 being excellent.

 

Efficacy of emerging network security technologies is influenced by the complexities involved in configuring policies for WAF

· Only half of the respondents say their organizations use emerging network security technologies to heighten visibility to applications and the use of cloud services.

· Respondents surveyed do not deploy or are unsure about Web Application Firewalls (61 percent) (WAFs) because they think it might affect revenues as the high incidence of false positives may block legitimate customer traffic.

· Majority (79 percent) of the respondents say that is takes them at least a few weeks to configure and update rules or policies for WAF.

 

To effectively secure data centers Juniper Networks believes companies must have knowledge of the attacking devices, not just the IP address, and quickly disseminate that intelligence across the data center and into the network. Juniper Networks can deliver this intelligence through its Junos® Spotlight Secure global attacker intelligence service, which acts as the consolidation point for attacker and threat information, feeding real-time intelligence to Juniper’s security solutions. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks® SRX Series Services Gateways.

The Ponemon Report surveyed 4,774 IT and IT security practitioners across the United States, Australia, United Kingdom, Germany, France, India, Japan, China and Brazil. In India, 554 IT and IT security practitioners took part in the 2013 study.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.