Welcome!

Cloud Security Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

Survey Shows Application Security Is Number One Priority for Information Security Executives

Cenzic(R) and the Software & Information Industry Association (SIAA) Announce "The Pulse of Information Security 2005" Revea

SANTA CLARA, CA -- (MARKET WIRE) -- 11/22/05 -- The first annual "The Pulse of Information Security Today," released today, reveals that application security is the number one priority for information security executives at large enterprises. Cenzic and the Software & Information Industry Association (SIIA) conducted the survey, interviewing a total of 198 enterprise information security professionals, in August and September 2005. The participants in this survey were selected from Cenzic and SIIA contacts.

Among the broad range of information security issues, "The Pulse of Application Security Today" uncovered a number of surprises and in some cases confirmed trends that have been emerging in the market. At the highest level, the survey shows that while application security is emerging as a top priority for enterprises, only 16% of companies are testing more than half of their applications. At the same time, application security budgets are increasing, but not dramatically. Despite the fact that many enterprises are satisfied with their current means of protecting their applications, many are fearful of being attacked in the next 12 months.

The highlights from the survey shed light on the unsettling fact that, despite ongoing anxiety about the threats associated with applications, companies are not currently doing enough to protect their application infrastructures and budgets are not keeping pace with the rapidly evolving threat environment.

Key findings from the report include:

--  Hacker intrusion protection is the clear #1 priority for 2005-2006.
    Nearly half of all respondents [46%] cited preventing security breaches and
    illegal access to data and applications as their #1 or #2 security priority
    through Q4 of 2006. Half of the respondents cited hacker intrusion as their
    #1 priority while 46% cited it as #2. Hacker intrusion protection and
    related issues was clearly the most important priority for 2005-2006 among
    participants.

--  While the overall number of companies hacked in the last year is low,
    the associated costs are extremely high. Only 12% of respondents reported
    having been attacked, but of the 12% that were attacked, 20% estimated the
    damage to be greater than $500,000, with 8% estimating damages to be
    greater than $2 million and 4% greater than $5 million.

--  Enterprises in general are satisfied with the effectiveness of their
    current application testing processes. Nearly half of all respondents rated
    the effectiveness of their current testing processes as "good" or
    "excellent," while nearly 90% rated their current processes as "average" or
    better [87%].

--  Enterprises are testing their applications. 42% of all respondents are
    testing more than 30% of their applications and nearly 1/4 [23%] of all
    respondents test more than 50%.

--  Enterprises are fearful of being hacked. Shedding light on the
    evolving threat landscape and the unpredictable nature of Internet
    security, nearly half of respondents are very or extremely concerned about
    getting hacked in the next 12 months. Despite general satisfaction in
    application security processes and the low number of attacks in the past 12
    months, enterprises are clearly fearful of being attacked in the future.

--  Enterprises are using a mix of products/techniques for application
    security. Application firewalls are the most popular among respondents
    [45%] along with data encryption [40%] and manual penetration testing
    [36%]. There was no decisive solution or single solution that dramatically
    outweighed the others. Survey respondents are relying on several different
    products and techniques to address the problem. About 1/4 of all
    respondents are using some kind of vulnerability management solution [23%].

--  Companies are spending more testing applications with 38% spending
    more than $100,000 per year and 13% spending more than $500,000 per year.
    These numbers do not reflect headcount so, if an organization has a large
    group doing manual penetration testing, those numbers are not shown here.
    

For a free copy of the complete report, please visit: http://www.cenzic.com/forms/ec.php?pubid=10021

About SIIA

The Software & Information Industry Association (SIIA) is the principal trade association for the software and digital content industry. SIIA provides global services in government relations, business development, corporate education and intellectual property protection to more than 600 leading software and information companies. For more information, visit http://www.siia.net.

About Cenzic

Cenzic is a leading provider of the next-generation enterprise software and services for automated application security assessment and compliance that allows Fortune 1000 corporations, mid-sized corporations, and government organizations to dramatically improve the security of web applications. Cenzic® Hailstorm®, the most accurate and extensible product in the industry, enables security experts, QA professionals, and developers to work together to assess, analyze, and remediate applications for security vulnerabilities, Hailstorm benefits include reduced security risk and liability, lower development and testing costs, and faster time-to-market. Cenzic ClickToSecure(TM) service is one of the industry's first solutions to combine the power of an enterprise-class application security assessment product with the flexibility of a managed security service. Cenzic's current focus includes financial services, e-retail, healthcare, and government sectors. For more information, visit www.cenzic.com.

CONTACT:
Jason Throckmorton or Jesse Odell
LaunchSquad
415-625-8555
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...