New RSA Research Uncovers Growing Security Risks as Businesses Rush to Adopt Emerging Web and Mobile Technologies
More than 80 percent of security leaders surveyed say risks are being overlooked as cost and revenue pressure rises; RSA’s Security for Business Innovation Council outlines steps to protect the “hyper-extended” enterprise
The first research study – conducted by IDG Research Services – reveals a significant gap between the speed at which organizations are adopting new connectivity, collaboration and communication technologies and their readiness to deploy them securely. The second study, from RSA’s Security for Business Innovation Council, outlines how companies can capitalize on the significant business advantages these new technologies represent without putting their organizations at risk.
“Businesses are becoming ‘hyper-extended enterprises,’ exchanging information with more constituencies in more ways and in more places than ever before,” said
IDG Report Shows Many Companies Leaping Without Looking
Commissioned by RSA, a 2009 IDG Research Services survey of 100 top security executives at companies with revenues of
Key findings include:
- More than 70 percent of survey respondents believe escalating levels of connectivity and information exchange powered by new web and communication technologies are transforming their organizations into hyper-extended enterprises.
- The majority of organizations have increased their use of virtualization, mobility and social networking over the past 12-24 months, with more than one -third reporting an increase in cloud computing.
- However, many of the responding companies do not have adequate strategies to assess the risks involved in adopting these new technologies. In some organizations, the corporate security department is only brought in when problems occur and in others, security is not even informed before these new technologies are used.
- Less than half of respondents have developed policies for employees to guide the use of social networking tools and sites.
- More than 30 percent of the responding companies already have at least some enterprise applications or business processes running in the cloud, with another
- 16 percent planning to begin migration within the next 12 months. Among these, two -thirds do not yet have a security strategy in place for cloud computing.
- More than 8 of 10 respondents are concerned that pressure to cut costs and generate revenue has increased their exposure to security risks. More than 7 in 10 have experienced a security incident in the last 18 months.
- The majority of respondents agree they need to change and improve their approach to enterprise security strategy to accommodate the realities of the hyper-extended enterprise.
Study findings are summarized in the IDG Research Services white paper, “As Hyper-Extended Enterprises Grow, So Do Security Risks,” which can be downloaded at (www.rsa.com/innovation). From here, organizations can also test their security readiness for the hyper-extended enterprise and compare results to those of the executives surveyed.
Hyper-Extended Enterprise Requires New Security Approach, Say Top Security Officers
Also today, RSA released the results of its fourth Security for Business Innovation Council report, “Charting the Path: Enabling the “Hyper-Extended” Enterprise in the Face of Unprecedented Risk.” In this report, top security leaders from around the globe explore how security strategies must transform in a world in which well-intentioned actions to drive new business value could open up disastrous risk exposures.
“At this particular point in time, when we have such a rapidly-changing environment, we need to absolutely cry, ‘Time out!’ We need to step away from it, and we need to examine if our program has all the right gears,” commented Council member Dr.
RSA’s prior study, “Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy” highlighted the importance of not pulling back on innovation in the face of budget and resource constraints. This new report demonstrates how top security leaders simultaneously grapple with the need to promote innovation while protecting information in an increasingly risky environment.
Report Offers Seven Steps to Build New Enterprise Security Model
Based on in-depth conversations with the Security for Business Innovation Council, whose members are some of the world’s top security officers, this report looks at where information security is headed. It offers specific recommendations for developing an updated information security model that reflects the emerging opportunities and dangers at hand. Council members outline why today’s threat environment is particularly treacherous and share advice on how to securely tap the hyper-extended enterprise for business advantage. Specific guidance includes:
1.) Rein in the Protection Environment: Identify ways to use resources more efficiently by taking a risk management approach to the existing security environment. For example, the Council outlines strategies for how to curtail the use of security resources that protect extraneous information assets, stored data, and devices. By reining in the protection environment, enterprises can simultaneously cut costs, reduce risk and free up resources for high-priority projects.
2.) Get Competitive: In challenging economic times, if business leaders perceive they are not getting what they need from the internal security organization, they may increase overall risk to the enterprise by turning to external service providers without involving corporate security. The Council explains how security teams must focus on the quality and efficiency of their services and be able to effectively articulate the value they provide for the price.
3.) Proactively Embrace Technology on Your Terms: Information security departments must accept that it is not feasible to block the use of new web and communications technologies; instead they must enable their secure use. Council members share guidance on moving from reactive to preventive security, and establishing a roadmap for the business to adopt new technologies.
4.) Shift from Protecting the Container to Protecting the Data: In the era of the hyper-extended enterprise, more and more enterprise data is processed and stored in containers not controlled by the business. For instance, the data may be processed by service providers or held in a personal PDA used by an employee or in a laptop owned by a contractor who may have multiple enterprise clients. Within this environment, the Council provides guidance on shifting from protecting the container to protecting the data.
5.) Adopt Advanced Security Monitoring Techniques: In today’s threat environment, security teams must update their approach to monitoring for abnormal and malicious events. Council members share advice on moving away from techniques such as signature-based anti-virus and blacklisting to more accurate techniques such as behavior-based monitoring and whitelisting.
6.) Collaborate to Create Industry Standards: Council members explore why the need for uniform standards for security professionals, third-party providers and emerging technologies has reached a critical juncture.
7.) Share Risk Intelligence: To help enterprises defend against international attackers and an increasingly sophisticated fraudster network, the Council recommends more robust and collaborative intelligence-sharing–spanning enterprises, law enforcement and government.
About the Security for Business Innovation Council
The Security for Business Innovation Council is comprised of 10 highly-successful Global 1000 security executives who are committed to sharing their own insights and experiences to help move information security forward at organizations worldwide.
Council members include:
The report released today is the fourth in the series, and RSA expects to publish more original Council reports over the coming months. Those interested in learning more about the Security for Business Innovation Council reports can visit the RSA Thought Leadership website at http://www.RSA.com/securityforinnovation/ to view and download all of the studies.
About IDG Research Services
As a division of International Data Group (IDG), the world’s leading technology media, research, and event company, IDG Research Services’ global products and services have become the trusted source for advice and insight into technology news and trends around the world. IDG’s global product and services include: online media, events and conferences, print publishing, market research and global marketing solutions. Further information about IDG can be found at www.idg.com.
RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world’s leading organizations succeed by solving their most complex and sensitive security challenges. RSA’s information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle – no matter where it moves, who accesses it or how it is used.
RSA offers industry-leading solutions in identity assurance & access control, data loss prevention, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.RSA.com and www.EMC.com.
SOURCE EMC Corporation