SlideShare a Scribd company logo
2014 Security Trends: SIEM,
Endpoint Security, Data Loss,
Mobile Devices and the Cloud

© 2013 Monterey Technology Group Inc.

Sponsored by
Thanks to

© 2013 Monterey Technology Group Inc.

www.Lumension.com
 Who are we?
 SIEM/Monitoring
 Top priorities 2014
 Top risks 2014

Preview of Key
Points

 Webinar topics for 2014

 Application control
 Virtualization
 Cloud
 Mobile
 Future
1 to 9
5.2%

10 to 49
6.4%

50 to 99
5.5%

5,000+
33.2%

What’s your
size?

100 to 499
16.1%

500 to 999
8.9%

2,000 to 4,999
13.0%
1,000 to 1,999
11.7%
Industry

Financial Services
High Technology
Professional Services
Healthcare
Public Sector (State & Local Government)
Education and Research
Public Sector (Federal Government)
Aerospace & Defense
Communications
Industrial Manufacturing
Retail
Utilities
Media and Entertainment
Travel & Transportation
Consumer Goods
Oil & Gas
Engineering and Construction
Automotive
Chemicals
Natural Resources
0.0%

5.0%

10.0%

15.0%

20.0%

25.0%
7%

Who are you?

26%

Technical
Manager / Director
VP and above

67%
4.4%

North America (US and
Canada)

15.2%

Americas (outside NA)

Where are
you?

4.1%
United Kingdom

2.4%

EMEA (Europe, Middle
East, Africa)

73.8%

APAC (Asia Pacific)
Biggest
challenge with
SIEM?

3%4%

16%

Resources

18%

Analysis
Volume
Cooperation

5%

Technology Management

17%

37%

Realtime
SIEM Product
 Logging
 Event forwarding
 Event correlation
 Applications





Webinar topics
for 2014

SQL
Exchange
SharePoint
More

 Linux/Unix
 Cloud audit logging
 VMWare

 APTs
 Prevention
 Detection

 Endpoint
 BitLocker vs other solutions
 Monitoring endpoints

 Mobile security
 Virtualization security
 Data protection
Compliance
Monitoring
Client Security

Top Priorities
for 2014

0%
0%
1%1%
3% 1%
3%
3%
3%
3%
4%

Business

15%

Misc IT
Misc Security

Network Security

13%

4%

Patch mgt
Data Loss Prevention

4%

Vulnerability Management

11%

4%
4%
5%

6%

10%

IAM and Authentication
Awareness
Virtualization
Quantified Risks
Training
Cloud
 Winner: Malware
 Sophistication
 Desktop/Laptop
 Mobile device

 Runners up

Greatest Risks
for 2014






Application vulnerabilities
Data security in the cloud
OS vulnerabilities
Spear Phishing attacks

 Other
 End-user security awareness
 Data loss/leakage
 Insider

 APT
 IAM
 Rights
 Privileged accounts

OTHER
DDOS ATTACKS
MAN-IN-THE-MIDDLE OR OTHER
BROWSER ATTACKS
MALWARE VIA MOBILE DEVICES
(E.G., SMARTPHONES, TABLETS)
SPEAR PHISHING ATTACKS

6.1%

15.0%
19.8%
33.5%
35.4%

OS VULNERABILITIES

36.9%

DATA SECURITY IN THE CLOUD

37.1%

APPLICATION VULNERABILITIES

42.7%

MALWARE VIA ENDPOINT
(E.G., DESKTOP, LAPTOP)

46.5%

MALWARE SOPHISTICATION

46.9%
 What do you currently/plan to virtualize?
100%
90%

80%
70%
60%

Virtualization

50%
40%

30%
20%
10%
0%

Servers

Endpoints

Applications

Mobile

Other

No Plans

4.62%

39.83%

31.89%

70.71%

90.04%

Plan to Deploy

5.05%

23.09%

21.21%

13.85%

5.34%

Currently Deployed

90.33%

37.09%

46.90%

15.44%

4.62%
Perceived effectiveness of security technologies

Other
Mobile device management (MDM)
Personal firewalls

Application
Control

Application control (whitelisting)
Endpoint data loss prevention (DLP)
Anti-spyware
Host-based intrusion prevention
Port and device control
Anti-malware
Vulnerability assessment
Full-disk and file encryption
(mobile data protection)
50

55

60

65

70

75
Perceived effectiveness of whitelisting between current/planned/non-users

Application
Control
6%

Mobile
Devices

9%

Employee-Owned Only

27%

Corporate-Owned Only
Mix
None

58%
Biggest concern regarding mobile devices

Mobile
Devices
Is your organization moving towards adopting clouddelivered applications?

Cloud usage
For those moving to the cloud, is security keeping up?

Cloud usage
We asked about personal and business cloud usage in the organization …

Do you allow personal cloud
applications on your
endpoints?

Cloud Usage

Do you have policies
restricting data being
moved to and from the
personal cloud?

Do you have enforcement
mechanisms managing data
being moved to and from
the personal cloud?
Does your organization
have a business cloud for
data storage and exchange
of files?

Yes (37.3%)

Yes
(51.8%)

No (62.7%)

No
(48.2
%)

No (81.1%)

Yes (39.2%)

No (60.8%)
What metrics does your management measure you on?

Metrics
(alt. view)
other
We asked several questions about where endpoint security was headed …

Changing
Security
Paradigms
 Security analytics is here to stay at UWS
 Mobile, APT, Malware and Data Loss are foremost on the risk radar
 Endpoint security is a common denominator for all of them

Bottom line

 Endpoint security more important than ever
 Mobile device trend reinforces this
 Cloud trend is limited and does not change this
 Virtualization of endpoints and application delivery is a complementary
issue

 What’s happening at endpoint security leader Lumension?
Additional
Information

www.lumension.com/endpoint-management-security-suite/buy-now.aspx

More Related Content

PDF
Consumerization at the Crossroads Infographic
DOCX
Tachyon_Flyer
PDF
Deloitte Technology Fast 500 EMEA 2013 Ranking
PDF
דירוג 50 החברות הצומחות
PDF
MobileSecurityInfographic_v3
PDF
Autumn 2015 EMEA Netskope Cloud Report
PDF
Nonprofit Tech Needs - Western Balkans (presentation)
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Consumerization at the Crossroads Infographic
Tachyon_Flyer
Deloitte Technology Fast 500 EMEA 2013 Ranking
דירוג 50 החברות הצומחות
MobileSecurityInfographic_v3
Autumn 2015 EMEA Netskope Cloud Report
Nonprofit Tech Needs - Western Balkans (presentation)
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

What's hot (15)

PPTX
mADL 2012 Introduction
PPTX
CompTIA Trends in Mobility
PPTX
The Mobility Challenge - Fran Rosch, SVP Mobility
PPTX
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
PDF
Fall 2015 Worldwide Netskope Cloud Report
PDF
Symantec Mobile Security Webinar
PDF
Nonprofit Tech Needs - Western Balkans
PDF
Cloud for Business Managers
PDF
Addressing the gap of women in leadership | Talent Connect Anaheim
PDF
Retail Industry Application Security Survey Insights
PPTX
Survey: Security Analytics and Intelligence
PDF
Infographic: Mobile user is always on
PDF
How Is Mobile Changing How You Capture And Create Process-Based Content?
PDF
The consumerization of it
PDF
Non-profit Tech Needs in North Macedonia
mADL 2012 Introduction
CompTIA Trends in Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
Fall 2015 Worldwide Netskope Cloud Report
Symantec Mobile Security Webinar
Nonprofit Tech Needs - Western Balkans
Cloud for Business Managers
Addressing the gap of women in leadership | Talent Connect Anaheim
Retail Industry Application Security Survey Insights
Survey: Security Analytics and Intelligence
Infographic: Mobile user is always on
How Is Mobile Changing How You Capture And Create Process-Based Content?
The consumerization of it
Non-profit Tech Needs in North Macedonia
Ad

Viewers also liked (6)

PPTX
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
PPTX
Mobile Security Trends in the Workplace
PPTX
Trends in Enterprise Mobility
PDF
IBM - IAM Security and Trends
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PDF
2015 Mobile Security Trends: Are You Ready?
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
Mobile Security Trends in the Workplace
Trends in Enterprise Mobility
IBM - IAM Security and Trends
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
2015 Mobile Security Trends: Are You Ready?
Ad

Similar to 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud (20)

PDF
Mobile Device Management Service: Yamana
PDF
Why terminal emulation 2
PDF
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
PPTX
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
PPTX
Shift of the Decade: Enterprise Goes Mobile
PDF
Mobile Testing Methodologies: Trends, Successes, and Pitfalls
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
PDF
G05.2013 gartner top security trends
PPTX
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PDF
Event 16 12-15 global information security workforce study 1.0
PDF
The state of the cloud csa survey webinar
PPTX
Security and Accountability in the Cloud (in partnership with SANS)
PPTX
Developing effective mobile policy
PPTX
Developing effective mobile policy
PPTX
Top Risks of Enterprise Mobility
PDF
Mobile Security
PDF
MTL Australia 2016 - The 3rd Wave of Security
PDF
Mobile Testing in the Cloud
PPTX
Softchoice Security Consolidation Survey Results
Mobile Device Management Service: Yamana
Why terminal emulation 2
36 Benefits: The Reasons to Enable Mobile Access to Central Systems via Termi...
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
Shift of the Decade: Enterprise Goes Mobile
Mobile Testing Methodologies: Trends, Successes, and Pitfalls
Data Privacy, Security, and Sovereignty in a Cloudy World
G05.2013 gartner top security trends
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Event 16 12-15 global information security workforce study 1.0
The state of the cloud csa survey webinar
Security and Accountability in the Cloud (in partnership with SANS)
Developing effective mobile policy
Developing effective mobile policy
Top Risks of Enterprise Mobility
Mobile Security
MTL Australia 2016 - The 3rd Wave of Security
Mobile Testing in the Cloud
Softchoice Security Consolidation Survey Results

More from Lumension (20)

PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
PPTX
2015 Endpoint and Mobile Security Buyers Guide
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
PPTX
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
PPTX
Careto: Unmasking a New Level in APT-ware
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
PPTX
2014 Data Protection Maturity Survey: Results and Analysis
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
PPTX
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
PPTX
Adobe Hacked Again: What Does It Mean for You?
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
PPTX
APTs: The State of Server Side Risk and Steps to Minimize Risk
PPTX
2014 Ultimate Buyers Guide to Endpoint Security Solutions
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
PPTX
Java Insecurity: How to Deal with the Constant Vulnerabilities
PPTX
BYOD & Mobile Security: How to Respond to the Security Risks
PPTX
3 Executive Strategies to Reduce Your IT Risk
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
2015 Endpoint and Mobile Security Buyers Guide
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
2014 BYOD and Mobile Security Survey Preliminary Results
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Careto: Unmasking a New Level in APT-ware
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
2014 Data Protection Maturity Survey: Results and Analysis
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Adobe Hacked Again: What Does It Mean for You?
Real World Defense Strategies for Targeted Endpoint Threats
APTs: The State of Server Side Risk and Steps to Minimize Risk
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Data Protection Rules are Changing: What Can You Do to Prepare?
Java Insecurity: How to Deal with the Constant Vulnerabilities
BYOD & Mobile Security: How to Respond to the Security Risks
3 Executive Strategies to Reduce Your IT Risk
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
Modernizing your data center with Dell and AMD
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud

  • 1. 2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and the Cloud © 2013 Monterey Technology Group Inc. Sponsored by
  • 2. Thanks to © 2013 Monterey Technology Group Inc. www.Lumension.com
  • 3.  Who are we?  SIEM/Monitoring  Top priorities 2014  Top risks 2014 Preview of Key Points  Webinar topics for 2014  Application control  Virtualization  Cloud  Mobile  Future
  • 4. 1 to 9 5.2% 10 to 49 6.4% 50 to 99 5.5% 5,000+ 33.2% What’s your size? 100 to 499 16.1% 500 to 999 8.9% 2,000 to 4,999 13.0% 1,000 to 1,999 11.7%
  • 5. Industry Financial Services High Technology Professional Services Healthcare Public Sector (State & Local Government) Education and Research Public Sector (Federal Government) Aerospace & Defense Communications Industrial Manufacturing Retail Utilities Media and Entertainment Travel & Transportation Consumer Goods Oil & Gas Engineering and Construction Automotive Chemicals Natural Resources 0.0% 5.0% 10.0% 15.0% 20.0% 25.0%
  • 6. 7% Who are you? 26% Technical Manager / Director VP and above 67%
  • 7. 4.4% North America (US and Canada) 15.2% Americas (outside NA) Where are you? 4.1% United Kingdom 2.4% EMEA (Europe, Middle East, Africa) 73.8% APAC (Asia Pacific)
  • 9.  Logging  Event forwarding  Event correlation  Applications     Webinar topics for 2014 SQL Exchange SharePoint More  Linux/Unix  Cloud audit logging  VMWare  APTs  Prevention  Detection  Endpoint  BitLocker vs other solutions  Monitoring endpoints  Mobile security  Virtualization security  Data protection
  • 10. Compliance Monitoring Client Security Top Priorities for 2014 0% 0% 1%1% 3% 1% 3% 3% 3% 3% 4% Business 15% Misc IT Misc Security Network Security 13% 4% Patch mgt Data Loss Prevention 4% Vulnerability Management 11% 4% 4% 5% 6% 10% IAM and Authentication Awareness Virtualization Quantified Risks Training Cloud
  • 11.  Winner: Malware  Sophistication  Desktop/Laptop  Mobile device  Runners up Greatest Risks for 2014     Application vulnerabilities Data security in the cloud OS vulnerabilities Spear Phishing attacks  Other  End-user security awareness  Data loss/leakage  Insider  APT  IAM  Rights  Privileged accounts OTHER DDOS ATTACKS MAN-IN-THE-MIDDLE OR OTHER BROWSER ATTACKS MALWARE VIA MOBILE DEVICES (E.G., SMARTPHONES, TABLETS) SPEAR PHISHING ATTACKS 6.1% 15.0% 19.8% 33.5% 35.4% OS VULNERABILITIES 36.9% DATA SECURITY IN THE CLOUD 37.1% APPLICATION VULNERABILITIES 42.7% MALWARE VIA ENDPOINT (E.G., DESKTOP, LAPTOP) 46.5% MALWARE SOPHISTICATION 46.9%
  • 12.  What do you currently/plan to virtualize? 100% 90% 80% 70% 60% Virtualization 50% 40% 30% 20% 10% 0% Servers Endpoints Applications Mobile Other No Plans 4.62% 39.83% 31.89% 70.71% 90.04% Plan to Deploy 5.05% 23.09% 21.21% 13.85% 5.34% Currently Deployed 90.33% 37.09% 46.90% 15.44% 4.62%
  • 13. Perceived effectiveness of security technologies Other Mobile device management (MDM) Personal firewalls Application Control Application control (whitelisting) Endpoint data loss prevention (DLP) Anti-spyware Host-based intrusion prevention Port and device control Anti-malware Vulnerability assessment Full-disk and file encryption (mobile data protection) 50 55 60 65 70 75
  • 14. Perceived effectiveness of whitelisting between current/planned/non-users Application Control
  • 16. Biggest concern regarding mobile devices Mobile Devices
  • 17. Is your organization moving towards adopting clouddelivered applications? Cloud usage
  • 18. For those moving to the cloud, is security keeping up? Cloud usage
  • 19. We asked about personal and business cloud usage in the organization … Do you allow personal cloud applications on your endpoints? Cloud Usage Do you have policies restricting data being moved to and from the personal cloud? Do you have enforcement mechanisms managing data being moved to and from the personal cloud? Does your organization have a business cloud for data storage and exchange of files? Yes (37.3%) Yes (51.8%) No (62.7%) No (48.2 %) No (81.1%) Yes (39.2%) No (60.8%)
  • 20. What metrics does your management measure you on? Metrics (alt. view) other
  • 21. We asked several questions about where endpoint security was headed … Changing Security Paradigms
  • 22.  Security analytics is here to stay at UWS  Mobile, APT, Malware and Data Loss are foremost on the risk radar  Endpoint security is a common denominator for all of them Bottom line  Endpoint security more important than ever  Mobile device trend reinforces this  Cloud trend is limited and does not change this  Virtualization of endpoints and application delivery is a complementary issue  What’s happening at endpoint security leader Lumension?