Cloud Security Authors: Maria C. Horton, Elizabeth White, Liz McMillan, Ravi Rajamiyer, Pat Romanski

Related Topics: Cloud Security

News Feed Item

Survey Shows Application Security Is Number One Priority for Information Security Executives

Cenzic(R) and the Software & Information Industry Association (SIAA) Announce "The Pulse of Information Security 2005" Revea

SANTA CLARA, CA -- (MARKET WIRE) -- 11/22/05 -- The first annual "The Pulse of Information Security Today," released today, reveals that application security is the number one priority for information security executives at large enterprises. Cenzic and the Software & Information Industry Association (SIIA) conducted the survey, interviewing a total of 198 enterprise information security professionals, in August and September 2005. The participants in this survey were selected from Cenzic and SIIA contacts.

Among the broad range of information security issues, "The Pulse of Application Security Today" uncovered a number of surprises and in some cases confirmed trends that have been emerging in the market. At the highest level, the survey shows that while application security is emerging as a top priority for enterprises, only 16% of companies are testing more than half of their applications. At the same time, application security budgets are increasing, but not dramatically. Despite the fact that many enterprises are satisfied with their current means of protecting their applications, many are fearful of being attacked in the next 12 months.

The highlights from the survey shed light on the unsettling fact that, despite ongoing anxiety about the threats associated with applications, companies are not currently doing enough to protect their application infrastructures and budgets are not keeping pace with the rapidly evolving threat environment.

Key findings from the report include:

--  Hacker intrusion protection is the clear #1 priority for 2005-2006.
    Nearly half of all respondents [46%] cited preventing security breaches and
    illegal access to data and applications as their #1 or #2 security priority
    through Q4 of 2006. Half of the respondents cited hacker intrusion as their
    #1 priority while 46% cited it as #2. Hacker intrusion protection and
    related issues was clearly the most important priority for 2005-2006 among

--  While the overall number of companies hacked in the last year is low,
    the associated costs are extremely high. Only 12% of respondents reported
    having been attacked, but of the 12% that were attacked, 20% estimated the
    damage to be greater than $500,000, with 8% estimating damages to be
    greater than $2 million and 4% greater than $5 million.

--  Enterprises in general are satisfied with the effectiveness of their
    current application testing processes. Nearly half of all respondents rated
    the effectiveness of their current testing processes as "good" or
    "excellent," while nearly 90% rated their current processes as "average" or
    better [87%].

--  Enterprises are testing their applications. 42% of all respondents are
    testing more than 30% of their applications and nearly 1/4 [23%] of all
    respondents test more than 50%.

--  Enterprises are fearful of being hacked. Shedding light on the
    evolving threat landscape and the unpredictable nature of Internet
    security, nearly half of respondents are very or extremely concerned about
    getting hacked in the next 12 months. Despite general satisfaction in
    application security processes and the low number of attacks in the past 12
    months, enterprises are clearly fearful of being attacked in the future.

--  Enterprises are using a mix of products/techniques for application
    security. Application firewalls are the most popular among respondents
    [45%] along with data encryption [40%] and manual penetration testing
    [36%]. There was no decisive solution or single solution that dramatically
    outweighed the others. Survey respondents are relying on several different
    products and techniques to address the problem. About 1/4 of all
    respondents are using some kind of vulnerability management solution [23%].

--  Companies are spending more testing applications with 38% spending
    more than $100,000 per year and 13% spending more than $500,000 per year.
    These numbers do not reflect headcount so, if an organization has a large
    group doing manual penetration testing, those numbers are not shown here.

For a free copy of the complete report, please visit: http://www.cenzic.com/forms/ec.php?pubid=10021

About SIIA

The Software & Information Industry Association (SIIA) is the principal trade association for the software and digital content industry. SIIA provides global services in government relations, business development, corporate education and intellectual property protection to more than 600 leading software and information companies. For more information, visit http://www.siia.net.

About Cenzic

Cenzic is a leading provider of the next-generation enterprise software and services for automated application security assessment and compliance that allows Fortune 1000 corporations, mid-sized corporations, and government organizations to dramatically improve the security of web applications. Cenzic® Hailstorm®, the most accurate and extensible product in the industry, enables security experts, QA professionals, and developers to work together to assess, analyze, and remediate applications for security vulnerabilities, Hailstorm benefits include reduced security risk and liability, lower development and testing costs, and faster time-to-market. Cenzic ClickToSecure(TM) service is one of the industry's first solutions to combine the power of an enterprise-class application security assessment product with the flexibility of a managed security service. Cenzic's current focus includes financial services, e-retail, healthcare, and government sectors. For more information, visit www.cenzic.com.

Jason Throckmorton or Jesse Odell
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...