Companies struggling with hybrid IT and zero trust controls – Pulse Secure
Software-defined access solutions provider Pulse Secure has released a report that quantifies the threats, gaps and investment as organisations face increasing hybrid IT access challenges.
The 2019 State of Enterprise Secure Access report surveys large enterprises in the US, UK and DACH (Germany, Austria, Switzerland), uncovering business risk and impact resulting in a pivot towards extending Zero Trust capabilities to enable productivity and stem exposures to multi-cloud resources, applications and sensitive data.
While enterprises are taking advantage of cloud computing, the survey data showed all enterprises have ongoing data centre dependencies.
One-fifth of respondents anticipate lowering their data centre investment, while more than 40% indicated a material increase in private and public cloud investment.
According to the report, the shift in how organisations deliver Hybrid IT services to enable digital transformation must also take into consideration empowering a mobile workforce, supporting consumer and IoT devices in the workplace and meeting data privacy compliance obligations – all make for a challenging environment to ensure, monitor and audit access security.
"What was consistent across enterprise sizes, sectors or location was that secure access for hybrid IT is a current and growing concern with cyber threats, requirements and issues emerging from many sources,” says IDG Connect editorial director Martin Veitch.
“The reporting findings and insights should empower corporate leadership and IT security professionals to rethink how their organisations are protecting resources and sensitive data as they migrate to the cloud.”
The survey found the most impactful incidents were contributed by a lack of user and device access visibility and lax endpoint, authentication and authorisation access controls. Over the last 18 months, half of all companies dealt with malware, unauthorised/vulnerable endpoint use and mobile or web apps exposures.
Nearly half experienced unauthorised access to data and resources due to insecure endpoints and privileged users, as well as unauthorised application access due to poor authentication or encryption controls.
While a third expressed significant confidence, 61% of respondents indicated modest confidence in their security processes, human resources, intelligence and tools to mitigate access security threats.
The survey revealed the top access threat mitigation deficiencies:
- Defining app, data and resource access and protection requirements
- Defining, implementing and enforcing user and device access policy
- Provisioning, monitoring and enforcing BYOD and IoT device access
When survey participants were asked what they perceive as their largest operational gaps for access security, the majority identified hybrid IT application availability; user, device and mobile discovery and exposures; weak device configuration compliance; and inconsistent or incomplete enforcement.
Correspondingly, the participants stated that their organisations are stepping up their access security initiatives:
- 48% improving endpoint security, remediation prior to access
- 46% enhancing IoT discovery, isolation and access control
- 44% fortifying network and cloud access visibility and resource segmentation
The cited incidents, threat mitigation deficiencies and operational gaps are among reasons for the interest in a Zero Trust approach for access security.
A Zero Trust model authenticates, authorises and verifies users, devices, applications and resources no matter where they reside.
It encompasses proving identity, device and security state before and during a transaction; applying a least privilege access closest to the entities, applications and data; and extending intelligence to allow policies to adapt to changing requirements and conditions.
Adding to management complexity, the report also found that organisations employ three or more secure access tools per each of 13 solutions presented in the survey.
Larger companies have about 30% more tools than smaller enterprises.
Correspondingly, nearly half of respondents were open to exploring the benefits of consolidating their security tools into suites.
With the migration to the cloud, one tool of interest cited by respondents as being implemented or planned over the next 18 months is Software Defined Perimeter (SDP).
- 91% of enterprises plan to increase secure access expenditure over the next 18 months; 30% anticipate an increase spend between 15% to 25%
- 44% of enterprises use data centre in conjunction with public cloud, 30% in conjunction with private cloud, and 26% utilise all three delivery environments
- 46% of large enterprises prefer data centre and private cloud; primarily preferred by financial services and UK-based companies
- 49% or more cited significant access incidents due to malware, unauthorised and vulnerable endpoint use and mobile and web app exposures - healthcare organisations experienced greater mobile and web app exposures
- 81% expressed gaps in hybrid IT application availability - financial services experienced the most business impact related to application availability
- 78% indicated the need for greater visibility of users, endpoints and mobile devices; more evident in large enterprises and those in the DACH region
- 42% will focus on refining privileged user or service account-based access – a top priority in financial services and manufacturing
- 48% stated a willingness to explore secure access tool consolidation into suites
- 56% stated a project or pilot of Software Defined Perimeter technology over the next 18 months
- Over 38% of respondents outsource secure access capabilities to Managed Security Service Providers (MSSPs) with additional MSSP usage to grow 10% by 2021
The independent research for the report, which offers key insights into the current access security landscape and the maturity of defences, was conducted by IDG Connect.
Survey respondents included more than 300 information security decision makers in enterprises with more than 1,000 employees across US, UK and DACH regions, and covered key verticals including financial services, healthcare, manufacturing and services.
Industry: Cyber Security News
- Head of CSOC (Cyber Security Operations Centre), London. Greenfield opportunity
CH7928 Identifier Project Head of CSOC (Cyber Security Operations Centre), London. Greenfield UNIQUE opportunity to establish, manage and grow a world class CSOC. Headquartered in the UK, the CSOC will grow and deliver cyber services into an international and underdeveloped market. As a greenfield site the Head of CSOC will be the first person on the ground to build a capability and team around them. The role will include, but not be limited to; Setting up and establishing a CSOC monitoring service using IBM QRadar and Palo Alto CORTEX XSOAR. Develop roadmap for future CSOC capabilities. Establish, develop processes, playbooks and use cases. Recruit, Build and train a specialist team. Build relationships with key clients- onboard and scale. The successful candidate must have experience working within / leading a technical Cyber Security monitoring capability. Technical experience working with IBM QRadar and Palo Alto CORTEX XSOAR will be highly beneficial, although other SIEM / Security Orchestration, Automation and Response tools are welcome as the skillset is transferable. This brings significant opportunity and welcomes creativity / best practice. Frequent travel to London office will be required. Chris.firstname.lastname@example.org 07884666351
- Aruba Data Centre Network Engineer
- Upto £500 a day
**Outside of IR35 contract** Aruba Data Centre Network engineer is required to start ASAP. You will be responsible for Data Center and Campus Network - Design and implementation of Aruba CX Switches, We are looking for an experienced data centre engineer who is happy to work remotely and autonomously Experience you will need to have, Solid Networking experience with good knowledge of -Routing & Switching - MP-BGP EVPN VXLAN, MPLS/VPLS, EIGRP, BGP, OSPF and Multicast, Experience with Aruba switches ideally the CX range Ideally SC cleared or able to become SC Cleared. This will be a 3 month rolling contract
- Network Engineer-
- 65000 plus bonus
An exciting opportunity has arisen with a global financal business that are looking for an experienced Network engineer with strong Firewall experience in particular Checkpoint You will be responsible for help to support and manage the network infrastructure both LAN/ WAN And VPNs and will have a focus on network secuirty (Checkpoint firewall and Security controls) This is a multi-Site environment with few thousand end users, As the business is growing so is the network so great opportunity to join an expanding business that will help cross-train you in both cloud and onsite solutions. They are looking for a strong network engineer with a mix of expereience o Experience with Azure networking managing VNETs, ExpressRoute, VPNs and other Azure network features such as NSG/MS loadbalancer is required. Working with Check Point firewalls in Azure is desirable. o In-Depth understanding of networking fundamentals including: Network topology, Data Centre Infrastructure systems, Layer 2/Layer 3 Switching, VLANs, Routing, VPNs, High availability protocols. o Demonstrable hands-on experience with Meraki Switches and wireless infrastructure, Arista software, Forcepoint Proxy (would be a strongly desirable), Citrix Netscaler, and Forescout CounterACT Location can be flexible, they are looking for someone who would be happy to do a hybrid working model 3 days at home 2 days in the office.
- Technical Cyber Trainer, United Kingdom
Technical Cyber Trainer, United Kingdom Cyber trainer needed to build a new cyber training capability to develop a team of international security analysts. Technical Cyber training experience is a MUST. Any experience delivering technical Blue team based training is highly desired. This is a UK based role. Able to travel to London on occasion- when required. Agile, flexible working. A technical background is highly desirable and prefered. The role Aid in the setup, fine tuning and on-going customisation of Technical Cyber Security’s training platform. CyberBit experience desirable. Design, develop and deliver the internal syllabus to train employees with low cybersecurity knowledge to become analysts. Manage, monitor, support and assess learners. Fine tuning training and bespoke development. Manage, monitor and assess SOC analysts. Support employees through their career. The ability to deliver remote training is essential. This is a UK based role. Able to travel to London on occasion- when required. Agile working. Apply today to find out more information. Chris.Holt@dclsearch.com +447884666351