Editorial & Advertiser Disclosure Global Banking And Finance Review is an independent publisher which offers News, information, Analysis, Opinion, Press Releases, Reviews, Research reports covering various economies, industries, products, services and companies. The content available on globalbankingandfinance.com is sourced by a mixture of different methods which is not limited to content produced and supplied by various staff writers, journalists, freelancers, individuals, organizations, companies, PR agencies Sponsored Posts etc. The information available on this website is purely for educational and informational purposes only. We cannot guarantee the accuracy or applicability of any of the information provided at globalbankingandfinance.com with respect to your individual or personal circumstances. Please seek professional advice from a qualified professional before making any financial decisions. Globalbankingandfinance.com also links to various third party websites and we cannot guarantee the accuracy or applicability of the information provided by third party websites. Links from various articles on our site to third party websites are a mixture of non-sponsored links and sponsored links. Only a very small fraction of the links which point to external websites are affiliate links. Some of the links which you may click on our website may link to various products and services from our partners who may compensate us if you buy a service or product or fill a form or install an app. This will not incur additional cost to you. A very few articles on our website are sponsored posts or paid advertorials. These are marked as sponsored posts at the bottom of each post. For avoidance of any doubts and to make it easier for you to differentiate sponsored or non-sponsored articles or links, you may consider all articles on our site or all links to external websites as sponsored . Please note that some of the services or products which we talk about carry a high level of risk and may not be suitable for everyone. These may be complex services or products and we request the readers to consider this purely from an educational standpoint. The information provided on this website is general in nature. Global Banking & Finance Review expressly disclaims any liability without any limitation which may arise directly or indirectly from the use of such information.

SURVEY INDICATES NETWORK ACCESS CONTROL PERCEIVED AS MOST EFFECTIVE SECURITY TECHNOLOGY TO DEFEND AGAINST CYBERTHREATS

CyberEdge’s “2014 Cyberthreat Defence Report”, published in early February, found that respondents rated network access control (NAC) highest of all the security technologies in its potential to defend against today’s cyberthreats and that 77 percent of IT professionals are using or plan to use NAC for mobile security. The survey also showed the compelling need for continuous monitoring and mitigation; more than 60 percent of participants had been breached in 2013, with a quarter of all participants citing a lack of employer investment in adequate defences as a factor.

The research, which is the first of its kind to offer a 360 degree view of organisations’ perceptions of security threats and their security investments, was completed by CyberEdge Group, LLC and sponsored by ForeScout Technologies, Inc., the leading provider of pervasive network security solutions for Global 2000 enterprises and government organisations, and eight other information security companies. Surveying more than 750 security decision makers and practitioners in organisations with 500-plus employees in North America and Europe, the report is designed to complement Verizon’s annual Data Breach Investigations Report.

Key Findings

The Cyberthreat Defence Report offered unique insights into challenges faced by professionals in IT. Some of the key findings relevant to network security and next-generation NAC include:

  • Participants were asked to rate—on a scale of 1 to 5, with 5 being highest—their perception on the effectiveness of various cyberthreat defence solutions. NAC received the highest marks at 3.71
  • NAC is the most often used technology (53 percent of respondents) to detect host security misconfigurations
  • NAC is the most often used technology to detect vulnerabilities and security misconfigurations within transient laptops and mobile devices (51 percent)
  • Adoption of BYOD policies is anticipated to move from 31 percent in 2014 to 77 percent in 2016
  • Endpoints are cited as the weakest link in most organisations’ IT environment

Information security is becoming more challenging due to three disruptive changes that nearly all enterprises are experiencing: IT infrastructure complexity due to an exponential increase in network connections and use of mobile, virtualisation and cloud technology; diminished capacity to manage endpoints caused by growing network-enabled and personal device use at the workplace; and difficulty to efficiently mitigate exposures within a growing attack landscape. To address these challenges, many organisations are supplementing their existing security investments with next-generation NAC to dynamically see and control user, device, application and access diversity. Organisations are also progressing their traditional layered defence model to one that leverages infrastructure interoperability in order to better support continuous monitoring and mitigation processes.

“The results of the ‘2014 Cyberthreat Defence Report’ point to the wins, gaps and importance of advancing defensive strategies to enforce controls and pre-empt attacks. As such, many organisations are investing in automated techniques, including next-generation network access control (NAC),” said Scott Gordon, chief marketing officer at ForeScout. “The bottom line is that operating infrastructures are more extended and accessible, and the threat landscape is dynamic. Network security has to be pervasive and continuous – leveraging policy, tool interoperability and automation to allow IT to be more effective.”

Report Available Now

The 2014 Cyberthreat Defence Report is available now from ForeScout at

http://www2.forescout.com/cyberedge_cyberthreat_2014

SURVEY INDICATES NETWORK ACCESS CONTROL PERCEIVED AS MOST EFFECTIVE SECURITY TECHNOLOGY TO DEFEND AGAINST CYBERTHREATS 2