Modernizing Authentication — What It Takes to Transform Secure Access
A recent survey of more than 700 IT security decision-makers found that only 27 percent of respondents block privileged user access to data, a proven method of mitigating insider attacks.
The survey, conducted by Vormetric in conjunction with Enterprise Strategy Group, also found that 66 percent of respondents use perimeter-focused network intrusion detection and prevention tools to identify and block insider threats, even though those tools are designed to protect from external attacks, not insider threats.
"The data is clear -- IT decision-makers are concerned about insider threats and data breaches, but tend to rely on perimeter and network security focused tools today, rather than securing the data at its source," Enterprise Strategy Group senior principal analyst Jon Oltsik said in a statement. "What this research highlights is that large organizations need a data-centric security strategy. Insider attacks are increasingly difficult to prevent and detect, and the research findings reveal the need for a change in approach."
The survey also found that only 40 percent of respondents are monitoring privileged user activities, 48 percent of organizations only review sensitive data access once a month, and fully 76 percent admit to not being proficient at detecting anomalous data access behavior in real time.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
The full Vormetric 2013 Insider Threat Report can be accessed here.
Photo courtesy of Shutterstock.