SlideShare a Scribd company logo
Network
Security Survey
And recommendations for
improvements in 2017
Survey by Enterprise Management
Associates, sponsored by Ixia
are still not inspecting
live network traffic
Yet14%
Three out of four enterprises have been affected*
ATTACKS ARE COMMON
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cyberthreat Defense Report
F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
of monitoring tools don’t
match the speed of the link
they’re deployed on
And 26%
Impact the performance of network devices
NETWORK UPGRADES
E M A N E T W O R K S E C U R I T Y S U R V E Y
O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r
L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
Protects traffic from an offline security appliance
AN INTERNAL BYPASS
But 45%of appliances cannot
be updated while
network is available
A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e
L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches
E M A N E T W O R K S E C U R I T Y S U R V E Y
of security appliances do
not receive filtered traffic
Yet 40-50%
Annual IP traffic is expected to triple
over the next five years*
TRAFFIC IS EXPLODING
R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g
L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring
E M A N E T W O R K S E C U R I T Y S U R V E Y
* 2016 Cisco Cloud Index
of tools are either
under- or over-utilized
But 63%
Should match enterprise needs without
over-investment
TOOL CAPACITY
S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c
L E A R N M O R E : https://www.ixiacom.com/securityfabric
E M A N E T W O R K S E C U R I T Y S U R V E Y
of staff time is spent
researching alerts and
configuring tools
And 25-50%
Is still a top concern of IT managers
SECURITY SKILLS GAP
B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e
L E A R N M O R E : https://www.ixiacom.com/products/threatarmor
E M A N E T W O R K S E C U R I T Y S U R V E Y
report IT budgets have
increased for the coming year
Around 80%
for network security in 2017
BUT THERE’S GOOD NEWS…
I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y
L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture
E M A N E T W O R K S E C U R I T Y S U R V E Y
Improve
Security
Invest in
Visibility
Recommendations for 2017
Deploy
Security Fabric
+ =
E M A N E T W O R K S E C U R I T Y S U R V E Y
Survey Demographics
< 500
< 1000
< 2500
< 5000
< 10000
10K+
20k+
13%
23%
20%
12%
16%
16%
10%
EMPLOYEES
5-20M
20-10M
100M-1B
1B+
Don't know
16%
31%
28%
20%
2% 2%
REVENUE
< 350k
< 1M
< 5M
< 10M
< 25M
< 50M
< 100M
100M+
Don’t know
1%
11%
17%
25%14%
15%
7%
7%
2%
IT BUDGET
E M A N E T W O R K S E C U R I T Y S U R V E Y
Complete survey results on SlideShare at: EMA Network Security Survey
For More Information
• Read the blog: Network Security Survey Finds Areas
for Improvement in 2017 .
• Learn how to make network security safer and more
resilient at:
www.ixiacom.com/solutions/inline-security-resilience
EMA Network Security Survey and Recommendations

More Related Content

PDF
EMA Network Security Survey Findings (SEP 2016)
PDF
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
PDF
Wiretap 5-collaboration-security-risks-revealed
PDF
Selling Your Organization on Application Security
PDF
3 Perspectives Around Data Breaches
PDF
application-security-fallacies-and-realities-veracode
PPTX
The Four(ish) Appsec Metrics You Can’t Ignore
PDF
Mobile Security: Apps are our digital lives.
EMA Network Security Survey Findings (SEP 2016)
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Wiretap 5-collaboration-security-risks-revealed
Selling Your Organization on Application Security
3 Perspectives Around Data Breaches
application-security-fallacies-and-realities-veracode
The Four(ish) Appsec Metrics You Can’t Ignore
Mobile Security: Apps are our digital lives.

What's hot (20)

PDF
Web Application Security Statistics Report 2016
PPTX
How to prevent data leaks with application security testing strategy
PDF
A Report on Cybersecurity
PDF
Cost of Cybercrime Study in Financial Services: 2019 Report
PDF
Next Generation Endpoint Prtection Buyers Guide
PDF
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
PDF
Cybercrime and Corporate Reputation
PDF
WhiteHat Security 8th Website Security Statistics Report
PDF
MobileSecurityInfographic_v3
PDF
India Threat Lanscape as per Symantec Research
PDF
Edgescan vulnerability stats report 2020
PDF
State of Web Application Security by Ponemon Institute
PPTX
New Synopsys research uncovers security's biggest challenges
PDF
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
PPTX
CompTIA - IT Security Sales Practices in the Channel
PDF
Nonprofit Tech Needs - Western Balkans (presentation)
PDF
11 Reasons Why Your Company Could Be In Danger
PPTX
SolarWinds MSP 2017 Cyber Security Report
PPTX
State of Application Delivery 2017 - Cloud Insights
PDF
Trust Online is at the Breaking Point
Web Application Security Statistics Report 2016
How to prevent data leaks with application security testing strategy
A Report on Cybersecurity
Cost of Cybercrime Study in Financial Services: 2019 Report
Next Generation Endpoint Prtection Buyers Guide
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
Cybercrime and Corporate Reputation
WhiteHat Security 8th Website Security Statistics Report
MobileSecurityInfographic_v3
India Threat Lanscape as per Symantec Research
Edgescan vulnerability stats report 2020
State of Web Application Security by Ponemon Institute
New Synopsys research uncovers security's biggest challenges
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
CompTIA - IT Security Sales Practices in the Channel
Nonprofit Tech Needs - Western Balkans (presentation)
11 Reasons Why Your Company Could Be In Danger
SolarWinds MSP 2017 Cyber Security Report
State of Application Delivery 2017 - Cloud Insights
Trust Online is at the Breaking Point
Ad

Viewers also liked (20)

PPTX
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
PDF
Design in Tech Report 2017
PDF
Cisco UCS for OpenStack Cloud
PPTX
Deploying OpenStack with Cisco Networking, Compute and Storage
PDF
17 Excel shortcuts to learn in 2017
PDF
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
PDF
Indice de bienveillance des marques - Agence Change 2017 présentation
PDF
Why should anyone work here? | London Business School
PDF
Injecting Security into vulnerable web apps at Runtime
PPTX
School for Change Agents - Module 4 Slides
PDF
Venture Scanner Fintech Report Q1 2017
PPTX
Why you should 10x your goals
PDF
Generation Z and the Future of Technology
PPTX
Key technologies online 2017 final
PPTX
Top 5 Deep Learning and AI Stories 3/9
PPTX
Payments Trends 2017
PDF
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
PDF
You Are Not As Rational As You Think
PDF
Digital in 2017 Global Overview
PDF
Hype vs. Reality: The AI Explainer
Pourquoi mes clients n'appliquent pas mes recommandations SEO (mais pas que ...)
Design in Tech Report 2017
Cisco UCS for OpenStack Cloud
Deploying OpenStack with Cisco Networking, Compute and Storage
17 Excel shortcuts to learn in 2017
Programme SIRHEN Référé de la Cour des Comptes Mars 2017
Indice de bienveillance des marques - Agence Change 2017 présentation
Why should anyone work here? | London Business School
Injecting Security into vulnerable web apps at Runtime
School for Change Agents - Module 4 Slides
Venture Scanner Fintech Report Q1 2017
Why you should 10x your goals
Generation Z and the Future of Technology
Key technologies online 2017 final
Top 5 Deep Learning and AI Stories 3/9
Payments Trends 2017
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
You Are Not As Rational As You Think
Digital in 2017 Global Overview
Hype vs. Reality: The AI Explainer
Ad

Similar to EMA Network Security Survey and Recommendations (20)

PPTX
SANS ICS Security Survey Report 2016
PDF
ACT Canada - Internet of Everything for Sustainable Mobility
PDF
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
PDF
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
Digital Technology in Mining: Progress and Opportunity
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
Analytical Driven Security - Chip Copper
PDF
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
PPTX
Cisco Security DNA
PDF
Making best-in-class security ubiquitous - Why security is no longer just an ...
PDF
IRJET- Authentication System in Social Networks
PDF
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
PDF
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
PPTX
Splunk Discovery Dusseldorf: September 2017 - Security Session
PDF
Internet of Everything for Marketers
PDF
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
PPTX
Securing the Digital Economy: Reinventing the Internet for Trust
PPTX
The rackspace difference v1 2016_10_03 (1)
PDF
2018 Global State of Information Security Survey
SANS ICS Security Survey Report 2016
ACT Canada - Internet of Everything for Sustainable Mobility
Naughty or Nice? Holidays Stress Merchants' Cybersecurity
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Digital Technology in Mining: Progress and Opportunity
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Analytical Driven Security - Chip Copper
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Cisco Security DNA
Making best-in-class security ubiquitous - Why security is no longer just an ...
IRJET- Authentication System in Social Networks
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Splunk Discovery Dusseldorf: September 2017 - Security Session
Internet of Everything for Marketers
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Securing the Digital Economy: Reinventing the Internet for Trust
The rackspace difference v1 2016_10_03 (1)
2018 Global State of Information Security Survey

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

EMA Network Security Survey and Recommendations

  • 1. Network Security Survey And recommendations for improvements in 2017 Survey by Enterprise Management Associates, sponsored by Ixia
  • 2. are still not inspecting live network traffic Yet14% Three out of four enterprises have been affected* ATTACKS ARE COMMON E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cyberthreat Defense Report F i n d t h r e a t s f a s t e r w i t h i n l i n e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/inline-security-resilience
  • 3. of monitoring tools don’t match the speed of the link they’re deployed on And 26% Impact the performance of network devices NETWORK UPGRADES E M A N E T W O R K S E C U R I T Y S U R V E Y O p e r a t e t o o l s e f f i c i e n t l y w i t h a p a c k e t b r o k e r L E A R N M O R E : https://www.ixiacom.com/products/network-packet-brokers
  • 4. Protects traffic from an offline security appliance AN INTERNAL BYPASS But 45%of appliances cannot be updated while network is available A n e x t e r n a l b y p a s s p r o t e c t s n e t w o r k u p t i m e L E A R N M O R E : https://www.ixiacom.com/products/bypass-switches E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 5. of security appliances do not receive filtered traffic Yet 40-50% Annual IP traffic is expected to triple over the next five years* TRAFFIC IS EXPLODING R e d u c e c o n g e s t i o n w i t h i n t e l l i g e n t f i l t e r i n g L E A R N M O R E : https://www.ixiacom.com/solutions/out-band-monitoring E M A N E T W O R K S E C U R I T Y S U R V E Y * 2016 Cisco Cloud Index
  • 6. of tools are either under- or over-utilized But 63% Should match enterprise needs without over-investment TOOL CAPACITY S h a r e t o o l c a p a c i t y w i t h a s e c u r i t y f a b r i c L E A R N M O R E : https://www.ixiacom.com/securityfabric E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 7. of staff time is spent researching alerts and configuring tools And 25-50% Is still a top concern of IT managers SECURITY SKILLS GAP B o o s t p r o d u c t i v i t y w i t h t h r e a t i n t e l l i g e n c e L E A R N M O R E : https://www.ixiacom.com/products/threatarmor E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 8. report IT budgets have increased for the coming year Around 80% for network security in 2017 BUT THERE’S GOOD NEWS… I n c r e a s i n g v i s i b i l i t y w i l l i m p r o v e s e c u r i t y L E A R N M O R E : https://www.ixiacom.com/solutions/ixvision-architecture E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 9. Improve Security Invest in Visibility Recommendations for 2017 Deploy Security Fabric + = E M A N E T W O R K S E C U R I T Y S U R V E Y
  • 10. Survey Demographics < 500 < 1000 < 2500 < 5000 < 10000 10K+ 20k+ 13% 23% 20% 12% 16% 16% 10% EMPLOYEES 5-20M 20-10M 100M-1B 1B+ Don't know 16% 31% 28% 20% 2% 2% REVENUE < 350k < 1M < 5M < 10M < 25M < 50M < 100M 100M+ Don’t know 1% 11% 17% 25%14% 15% 7% 7% 2% IT BUDGET E M A N E T W O R K S E C U R I T Y S U R V E Y Complete survey results on SlideShare at: EMA Network Security Survey
  • 11. For More Information • Read the blog: Network Security Survey Finds Areas for Improvement in 2017 . • Learn how to make network security safer and more resilient at: www.ixiacom.com/solutions/inline-security-resilience