Has Complexity Become Security's Chief Nemesis?

Study says proliferation of vendors, lack of user awareness are top challenges for security pros

The sheer complexity of managing the enterprise security environment has become one of the chief obstacles to building a secure environment, according to a study published last week.

An overabundance of vendors and regulatory requirements -- as well as the continuing problem of end user ignorance -- are combining to prevent many large enterprises from building an effective security defense, according to Understanding Security Complexity in 21st Century IT Environments, a new study published by the Ponemon Institute and Check Point Software Technologies Ltd.

According to the survey of over 2,400 IT security administrators around the world, managing complex security environments is the most significant challenge facing organizations today, with over 55 percent of companies using more than seven different vendors to secure their networks.

"A lot of companies would like to consolidate vendors, but it's easier to get budget if you present a problem and then purchase a single product to solve it," notes Larry Ponemon, founder and CEO of the research firm. "Ironically, consolidation is harder to cost-justify than point solutions, because there is a cost associated with consolidation projects. But having so many vendors can be an administrative nightmare on the back end."

According to the survey, over 700 respondents believe the primary concern with emerging technology adoption is compliance. Yet achieving regulatory compliance on a global scale is an incredibly complex problem, Ponemon observes.

"A lot of companies approach it by saying that they'll comply with the regulations that are the most stringent and challenging -- such as Germany's -- and they think that will make it easier to comply with 80 percent of the requirements of other countries, which seems good enough," Ponemon says. "But in fact, a lot of companies are getting bogged down by issues in complying with the other 20 percent of regulations."

Companies also continue to struggle with uneducated users who make blunders that put the company at risk, according to the study. In fact, 48.8 percent of respondents believe their organizations’ employees have little or no awareness about their data protection or corporate policies.

In addition, survey respondents believe the ability to manage policies by user is a key functionality to enforce better security overall, with 58 percent citing identity awareness as a priority.

"Companies are constantly facing new and costly security risks from both internal and external sources that can jeopardize the business. Our research has shown that one cyber-attack can range anywhere from $237,000 to $52 million," says Ponemon. "However, employees can play a big role in being a first line of defense, helping their company enforce stronger security measures and promoting more user awareness within the organization."

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version that could allow a malicious user with local access to execute code with administrative privileges.
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.