You are on page 1of 1

THE CONNECTION BETWEEN

SECURITY
AND

DATA & ANALYTICS

Organizations Guidelines to Securing


Data and Securing Themselves

78%

believe that the


collection & analysis
of big data has the
potential to
fundamentally
change the way
companies do business
over the next 3 years.

51%

HERES WHERE THEYRE SPENDING

57% 54% 46%


STORAGE
CAPACITY

DATA
SECURITY

23% WILL ADOPT IN THE NEXT YEAR

CLOUD
MANAGEMENT

44%

of enterprise organizations use


big data analytics to identify
information security incidents.

AN ADDITIONAL

In order to keep up with data-driven


initiatives, organizations will need to
invest in their data centers.

Security is all about


the metrics, too, and
analytics will give you
that. Youre logging it
and can quantify it. I
cant imagine doing my
job without analytics.

of organizations
expect their IT budget
allocated for data-driven
initiatives to increase
over the next 12 to 18
months.

PETER MILLER, CSO AT ORANGE COUNTY, FLORIDA,


EXPLAINED TO CSOS MICHAEL FITZGERALD

SOLVING SECURITY PROBLEMS WITH DATA

NEARLY A

The question is, do organizations value this data?

OF ORGANIZATIONS SAY

Data-Driven Initiatives Aim to Lessen Security Challenges

QUARTER (21%) THE ANSWER IS YES.

SECURITY
33%
MONITORING TOOLS
ARE A COMMON
SOURCE OF DATA

ORGANIZATIONS ARE USING DATA & ANALYTICS


TO PREPARE AGAINST THREATS.

28%

IDENTIFY COMPUTER
SECURITY RISKS
ENTERPRISE 39% SMB 29%

PREDICT FRAUD
OR FINANCIAL RISK
ENTERPRISE 32% SMB 25%
49% FINANCIAL SERVICES

Determining Security Posture Through Data & Analytics

AT THEIR ORGANIZATION.

47%

OF ORGANIZATIONS
ARE ABLE TO FEED
DATA FROM SECURITY
MONITORING ACTIVITY
INTO ANALYTICS TO
IMPROVE SECURITY
POSTURE

15%
YES,
TO GREAT EXTENT

38%

32%

OF ORGANIZATIONS
ARE CURRENTLY NOT
ABLE TO FEED DATA FROM
SECURITY MONITORING
ACTIVITY INTO ANALYTICS
TO IMPROVE SECURITY
POSTURE

18%

20%

NO, BUT WE ARE


PLANNING TO
OVER THE NEXT
12 MONTHS

NO, AND WE HAVE


NO PLANS TO
DO SO

YES,
TO SOME EXTENT

Security Ranks High in Enterprises Vendor Evaluation

51%

38%

INTEGRATION
INTO EXISTING
INFRASTRUCTURE

33%

APPROPRIATE
LEVEL OF
SCALABILITY

33%

CONFORMANCE
WITH INDUSTRY
STANDARDS
FOR SECURITY/
GOVERNANCE

SUPPORT AND SERVICES

SECURITY BEHIND THE DATA


Half of the organizations are
considering making a change to
their current information
security management model.

84%
FOR

78%

OF THEM,
THIS IS FUELED BY
CONCERNS ABOUT
DATA BREACH/
DATA LOSS

of organizations use at
least one solution to
secure the output of
their big data initiatives

What solutions are being used?

59%
52%
42%
38%
23%

IDENTITY AND ACCESS CONTROL


DATA ENCRYPTION
DATA SEGREGATION
DATA LOSS PREVENTION TOOLS
BEHAVIORAL ANALYSIS TOOLS

How sensitive really is sensitive data?

(financial information, customer information, PII, patient records)

20%

48%

HAVE PLACED
RESTRICTIONS
ON THE AMOUNT
OF SENSITIVE
DATA THEY
COLLECT

DONT EVEN COLLECT


SENSITIVE DATA

Why arent they?


NEED TO MEET COMPLIANCE MANDATES

ENTERPRISE 67% SMB 39%

Are these solutions different than


what is used to secure input data?
NO, WE FEEL THAT THE
MEASURES WE ARE
TAKING TO SECURE
EXISTING DATA OR
INPUT ARE
ADEQUATE

44%

CONCERNS ABOUT THE ABILITY TO STORE


THIS DATA IN A SECURE WAY

38%
18%

ENTERPRISE 39% SMB 36%


WE HAVE NO NEED TO COLLECT SENSITIVE DATA

YES, WE ARE TAKING

ALTERNATE OR ADDITIONAL
MEASURES TO SECURE THE
OUTPUT OF BIG DATA ONCE
ITS GENERATED
46% IT EXECUTIVES VS.
28% IT MANAGEMENT
29% IT PROFESSIONALS
35% BUSINESS MANAGEMENT

DONT KNOW

ENTERPRISE 22% SMB 46%


On a personal level:

71%

have IT Decision-Makers
changed their
SAY THEIR KNOWLEDGE OF HOW
security habits due
DATA IS USED HAS CREATED
SOME PERSONAL CONCERN
to understanding
of data?
33% HAVE LIMITED THEIR ONLINE PURCHASES AND OVERALL TECH DEVICE USAGE
37% HAVE NOT CHANGED THEIR ONLINE HABITS

29%

SAY THEIR KNOWLEDGE OF HOW


DATA IS USED HAS NOT CREATED
ANY PERSONAL CONCERN
21% DO NOT LOOK AT DATA AS A PERSONAL CONCERN
8% DO NOT HAVE ENOUGH DEVICES IN ORDER FOR COMPANIES TO TRACK THEIR DATA

SOURCES: CSOonline.com Article The CSO 2016 Security Data Analytics Survival Guide; Enterprise InfoSec CIO/Computerworld/CSO Study;
IDG Enterprise Data & Analytics Survey 2016; The 2016 Global State of Information Security Survey, in partnership with PwC, CIO, CSO, October 2015

FOR MORE INFORMATION VISIT


IDGENTERPRISE.COM/RESEARCH

You might also like