A Data-Centric Approach to Endpoint Security
September 28, 2017
Eric Ogren
Senior Analyst, Security 451 Research
Bill Bradley
Director of Product Marketing Digital Guardian
A Data-Centric Approach to Endpoint Security September 28, 2017 - - PowerPoint PPT Presentation
A Data-Centric Approach to Endpoint Security September 28, 2017 Eric Ogren Bill Bradley Senior Analyst, Security Director of Product Marketing 451 Research Digital Guardian About Eric Ogren Eric Ogren is a Senior Analyst with the
September 28, 2017
Eric Ogren
Senior Analyst, Security 451 Research
Bill Bradley
Director of Product Marketing Digital Guardian
development, technology marketing, and as a security industry analyst.
differentiated vendor messaging and positioning, and meeting enterprise solution purchase criteria.
positions with security vendors such as RSA Security and OKENA, and technology vendors such as Digital Equipment.
2
Eric Ogren
Senior ¡Analyst, ¡Security ¡
¡ ¡ ¡
Product Marketing & Management
3
Bill Bradley
Director, ¡Product ¡Marke6ng ¡
¡ ¡ ¡
4
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
security tasks?
Average Size and Ratio of Security Team – By Company Size
Information Security Respondents 5
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Average Number of Employees in Information Security Average Ratio of Security Employees to IT employees
14.1% 7.6% 11.1%
0.0% 5.0% 10.0% 15.0% 20.0% 25.0%
1-999 employees 1,000-9,999 employees 10,000+ employees
5 9 54 10 20 30 40 50 60
1-999 employees 1,000-9,999 employees 10,000+ employees
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 6
Average Ratio of Security Employees to IT employees – By Industry
Information Security Respondents
14.7% 14.2% 11.9% 10.8% 10.8% 10.7% 10.5% 9.7% 6.1% 4.1% 8.0% Services B2B Software, IT and Computer Services Retail Healthcare Govt/Educ Manufacturing Finance Telecommunications Communications, Media and Publishing Utilities Other
Mean
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Information Security report to?
7
Information Security Reporting Chain
Respondents with a Single Information Security Executive Leader in Their Organizations
46.6% 21.9% 5.2% 5.2% 4.4% 3.3% 3.8% 9.6% 43.2% 20.1% 8.3% 7.9% 7.0% 4.8% 2.6% 6.1%
CIO, Head of Information Technology CEO CTO Board of Directors COO CFO Chief Risk Officer Other Percent of Sample Q2 2016 (n=479) Q2 2017 (n=229)
8
9
10
11
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
information security concerns during the last 90 days? Please select all that apply.
12
Top Information Security Concerns – Past 90 Days
Information Security Respondents
52.5% 49.1% 31.7% 19.8% 19.6% 7.3% Hackers/Crackers with Malicious Intent Compliance Internal Audit Deficiencies Based on Findings Preventing/Detecting Insider Espionage Cyber-Warfare Other Percent of Sample
n = 495
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
security projects currently being implemented within your
determinant in their approval?
13
Reasons for Implementing Security Projects
Information Security Respondents
21.6% 21.4% 11.1% 9.9% 9.1% 8.9% 8.7% 5.5% 3.8% Risk Assessment Compliance Requirement Business Requirement Championed by a Senior Leader (e.g., Sacred Cow) Driven by Due Diligence (e.g., Customer Requirement) Audit Response Reputational/Brand Risk Return on Investment (ROI) Other Percent of Sample
n = 495
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
security pain points? Please select up to three.
14
Top Security Pain Points
Information Security Respondents
34.1% 21.0% 20.6% 20.4% 19.0% 18.4% 17.2% 17.0% 16.6% 16.0% 14.7% 12.1% 11.9% 11.7% 11.5% 9.3% 4.6%
User Behavior Organizational Politics/Lack of Attention to Information Security Staffing Information Security Lack of Budget Security Awareness Training (Ineffectiveness or Difficulty) Accurate, Timely Monitoring of Security Events Endpoint Security Malicious Software (Malware) Cloud Security Application Security Data Loss/Theft Mobile Security Ransomware Third-Party/Supplier Security Keeping Up with New Technology Firewall/Edge Network Security Other
Percent of Sample
n = 495
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
metrics does your organization use/track for information security staff? Please select all that apply.
15
Metrics To Manage Security
Information Security Respondents
53.0% 42.8% 44.9% 34.2% 34.4% 31.2% 32.4% 21.9% 2.2% 47.5% 39.0% 34.4% 34.2% 32.3% 29.2% 28.3% 21.9% 4.0%
Security Incidents Resolved Tickets Resolved (e.g., ‘Trouble Tickets’) Audit Issues Resolved Application Availability (e.g., Uptime/Downtime) Project Completion Time to Recovery/Restore from an Outage Lack of Data Breaches We Don’t Use Metrics Other
Percent of Sample Q2 2016 (n=837) Q2 2017 (n=421)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Security Analytics
Information Security Respondents
16
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
38.7% 34.7% 26.5%
In Use Planned for the Next 12 Months Not In Plan Percent of Sample
n = 426
24.5% 23.9% 14.5% 13.8% 11.3% 6.3% 2.5% 3.1%
Better Able To Detect and Address External Attacks Better Anomaly Detection on Our Network Improved Incident Response/Forensics Evidence Data Capture We’re Detecting Security Incidents Not Previously Captured Better Ability To Understand and Respond to Anomalous User Behavior Better Able To Detect and Address Internal Attacks No Benefit Other
Percent of Sample
n = 159
Security Analytics Status Key Benefit of Security Analytics
17
18
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
for increasing information security focused staff? Please select all that apply.
19
Staff Increase Reasons
Respondents with Increasing Security Staff
49.6% 49.1% 44.2% 25.3% 9.0% 10.5% 7.2% 48.7% 45.1% 40.0% 25.1% 7.7% 7.7% 12.3%
Significant Project(s) Driving Additional Demand New Skills Are Required Overall Business Growth IT Organizational Changes (e.g., Restructuring teams) Company Merger/Acquisition Information Security Functions being In-Sourced from a Third-Party Provider or Managed Security Service Provider (MSSP) Other
Percent of Sample
Q2 2016 (n=391) Q2 2017 (n=195)
20
Digital Guardian for Data Protection
22
Incident Responder Threat Hunter InfoSec Analyst
23
24
25
26
27
WELCOME TO
DETECT THREATS STOP DATA THEFT From Insiders & Outside Attackers Ransomware, Malware and Non-Malware Based
28
WELCOME TO
DETECT THREATS STOP DATA THEFT From Insiders & Outside Attackers Ransomware, Malware and Non-Malware Based
29
WELCOME TO
DETECT THREATS STOP DATA THEFT From Insiders & Outside Attackers Ransomware, Malware and Non-Malware Based
Data ¡ ¡ Discovery ¡
Confidential 30
DG ¡Appliance ¡ DG ¡Agent(s) ¡ ¡
Data ¡ ¡ Classifica7on ¡ Data ¡Loss ¡ Preven7on ¡ Endpoint ¡ Detec7on ¡& ¡ Response ¡
SOLUTIONS ¡ DIGITAL ¡GUARDIAN ¡PLATFORM ¡
Cloud ¡Data ¡ Protec7on ¡
DG ¡Analy7cs ¡& ¡Repor7ng ¡Cloud ¡ DG ¡Management ¡Console ¡
Endpoint Storage Cloud Network
31
Endpoint Storage Cloud Network
32
Data Events User Events System Events
Endpoint Storage Cloud Network
33
Data Events User Events System Events
Combining system, user and data insights provides the visibility to protect against ALL THREATS.
34
35
36
37
38
39
40
October 26, 2017 1PM ET
41