sb-eu logo
Story image

85% of enterprises struggling to protect network assets - Endace

27 Jun 2019

Network services provider Endace has announced the results of its latest research study,Challenges of Managing and Securing the Network 2019, conducted by independent US-based research company Virtual Intelligence Briefing (VIB).

The study surveyed senior executives and technical staff at more than 250 large enterprises globally to understand the challenges that these organisations face in protecting their networks from cyber attack and performance issues.

Organisations from a range of industry verticals including finance, healthcare, insurance and retail participated in the study, which found that one of the biggest challenges for all organisations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security threats or outages.

“96% of respondents indicated they have significant on-premise infrastructure to defend. Clearly, they have data governance and sovereignty responsibilities they can’t outsource,” says Endace CEO Stuart Wilson.

Respondents cited the need for greater visibility into network activity as one of their top issues: almost 90% of respondents rated having ‘insufficient visibility into network activity to be certain about what is happening’ as a significant challenge for their organisation.

Some of the key issues reported were:

  • 81% of respondents reported not having enough monitoring tools in the right places on the network.
  • 80% rated ‘alert fatigue’ as a significant concern.
  • 76% reported that ‘tool fatigue’ is a significant issue.
  •  91% indicated ‘integrating solutions to streamline processes, increase productivity and reduce complexity’ is a significant challenge.
  • 90% reported slow, complex CAPEX purchasing cycles are reducing their flexibility in defending their organisations’ networks.

Virtual Intelligence Briefing marketing and research solutions director Tom Riddle says, "This research findings show that IT and security staff still lack adequate tools, efficient workflows and the agility necessary to investigate and respond to threats or issues quickly and accurately enough to keep their infrastructure safe and trouble-free."

Endace product management VP Cary Wright says, “This research shows that organisations urgently need to streamline their approach to security to enable rapid and cost-effective deployment.

"Moving to a common, open analytics platform to host a range of security solutions is a key tactic for better security.”

Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More