Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:58 AM
Dark Reading
Dark Reading
Products and Releases

nCircle Survey: 89% Of Organizations Able to Implement Continuous Monitoring Program

But 60% are not scanning for configuration compliance

SAN FRANCISCO, CA —September 21, 2010 – Eighty-nine percent of IT organizations have the ability to implement a continuous monitoring program, but 60% are not scanning for configuration compliance, according to a recent survey by nCircle, the leading provider of automated security and compliance auditing solutions. Continuous monitoring is a key component of upcoming changes to FISMA regulations.

The online survey of 101 security professionals was conducted between July 27 and August 2, 2010, and focused on continuous monitoring for vulnerabilities as well as configuration compliance.

Key findings include:

* 43% of respondents are only scanning their networks for vulnerabilities periodically, resulting in an incomplete assessment of their organization’s risk * 60% of respondents are not scanning their networks for configuration compliance on a continuous basis * 31% are not able to resolve all significant security risks uncovered by their monitoring processes and 44% report the top reason for this is lack of adequate resources

“The dramatic growth in the number and type of IT devices -- and the possibility of mis-configuration of these devices -- can expose enterprise networks to significant risk. Configuration compliance represents one of the best opportunities for risk reduction to the enterprise,” according to Elizabeth Ireland, Vice President of Strategy for nCircle. Ireland recommends organizations continue their drive toward continuous monitoring, and add configuration auditing to their agenda. To be effective, she notes that these actions must be coupled with effective corrective efforts. Resources are always challenging, but she also points out “The visibility of security risk with senior management is the single largest factor in resourcing required to improve an organizations security posture.”

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,500 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

nCircle is a registered trademark of nCircle Network Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.