Endpoint and Mobile Top Security Spending at 57% of Businesses
Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.
There is a disconnect between businesses' ideal security practices and their actual strategies. Some 77% of companies cite data-at-rest security tools as the most effective for preventing breaches but fall toward the bottom (40%) of security spending priorities, new data shows.
In its 2018 Data Threat Report, Thales teamed up with 451 Research to poll 1,200 senior security execs around the world. They discovered 94% of respondents use sensitive data in the cloud, big data, IoT, container, blockchain, and/or mobile environments. Forty-four percent say they feel "very" or "extremely" vulnerable to data security threats.
For 57% of businesses, the bulk of security budgets goes toward endpoint and mobile security technologies, followed by analysis and correlation tools (50%). The disconnect extends to encryption, which many cite as important but don't allocate spending toward encryption tech.
Forty-two percent of respondents use more than 50 SaaS applications, 57% use three or more IaaS vendors, and 53% use three or more PaaS environments. Nearly half (44%) cite encryption as the top tool for increased cloud usage; 35% say it's a necessary part of big data adoption. Encryption is also cited as the top tool for securing IoT (48%) and container (41%) deployments.
Read more details here.
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024