Endpoint security frustrates IT

Germans most content with their network security plans, study finds

There's a groundswell of frustration about today's endpoint security, as well as worries about how newer technologies such as virtualization or cloud computing will impact it, according to a new study.

The Ponemon survey of 1,427 professionals in IT security and 1,582 in IT operations, working in business or government who live in the United States, the United Kingdom, Australia, New Zealand or Germany, were asked how they managed endpoint security, how things were going with the budget and security policies, and even whether the IT security and operations divisions worked well together.

The result of the Ponemon survey, titled "State of the Endpoint," paints a picture of discontent -- though respondents in Germany were the most upbeat, expressing views that they were executing well on policies and their IT security budgets were holding up.

"The Germans are much more structured in their thinking about these issues, such as collaboration and policy," says Dr. Larry Ponemon, chairman of Ponemon Institute, which conducted the study with sponsorship from Lumension. "They have the highest regard for policies.”

Fave Raves: Six enterprise products people love 

Seventy-seven percent of the respondents in Germany said they thought their network was more secure than a year ago, while only 44% in the United States, 42% in Australia and New Zealand, and 57% in the United Kingdom felt that way. When asked if the organization's IT security budget supported business objectives, 51% in Germany said it did, but only 43% in Australia and New Zealand, 31% in the United Kingdom and a mere 27% in the United States answered yes.

Overall, 49% said "data security is not a strategic initiative" for their companies, and 56% believe "mobile devices are not secure." Forty-four percent said their organizations subsidize or plan to subsidize employees' mobile devices, 40% say employees can connect their devices to the company network and 26% have policies permitting employees to connect their own devices to the company network.

There was a widely noted disconnect between how well the IT security and operations people work together on security-related projects, plus frustration about the level of involvement of the CIO. Seventeen percent of all respondents described the collaboration between the IT and security operations as "excellent," 52% said it "could be improved" and 31% said it was "poor."

Ponemon said IT operations people tend to have a "git 'er done" attitude while security people more often will want to hold back as they contemplate the impact of new IT undertakings on risk.

He also noted that U.S. respondents view technology as "the main driver for confidence in the security infrastructure" and are eager buyers. However, he added that putting several different point solutions in place can make the IT operations people "upset."

The five most important features for managing endpoint security identified in the survey were: antivirus and antimalware; whole disk encryption; application control; patch and remediation management; and IT asset management.

In terms of what the survey's respondents said about technology use today, they reported an average of 3.7 software agents installed on each endpoint for purposes of managing security, and 3.9 software management consoles to deal with. Some 83% of the survey's respondents said that within the next 12 to 24 months they intend to have an "integrated endpoint security suite"that would include functions such as vulnerability assessment, data-loss prevention, antivirus/antimalware and other capabilities.

The things that the IT security and operations people are worrying about appear to include increasing use of technologies that involve open source, Web 2.0 applications, cloud computing and virtualization, plus mobile computing.

Learn more about this topic

Data breach costs rising, study found

Why this economy is good for IT operations

Endpoint security: Is the future in software suites?
Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Now read: Getting grounded in IoT