Page 111 - Cyber Warnings
P. 111
1. Threat Analytics
2. Identity and Access Management (IAM)
3. Active Directory (AD) Management and Security
4. Data Access Governance (DAG)
5. Compliance
6. Security Information Event Management (SIEM)
2. Deployment Maturity ∆ 2015 - 2017
Respondents indicated the deployment phase of key security technologies, and for each
solution category, the leading answer was “not planned.” Solutions included in the
Development Maturity question included:
• Data Loss Prevention (DLP):
o Deployment not planned: 24% in 2015, 29% in 2016, 37% in 2017
• Identity and Access Management (IAM):
o Deployment not planned: 26% in 2015, 32% in 2016, 29% in 2017
• Privileged Identity Management (PIM):
o Deployment not planned: 28% in 2015, 42% in 2016, 35% in 2017
• Security Information and Event Management (SIEM):
o Deployment not planned: 32% in 2015, 36% in 2016, 29% in 2017
• User Entity Behavior Analytics (UEBA):
o Deployment not planned 49% in 2016, 44% in 2017
Of those five security technologies, IAM and SIEM were the most widely accepted/deployed at
this time, while, unsurprisingly, UEBA is the least mature.
3. Greatest Threats to Organizational Data
STEALTHbits found that from 2016 to 2017, the four most prevalent threats -- Human Error,
Abuse of Privileges, Malicious Code/Viruses, and Advanced Persistent Threats -- continued to
grow in concern at a steady rate. However, unlike previous years, respondents did not rank
Massive Amount of Data as being a highly-ranked threat. Instead, Advanced Persistent Threats
emerged as a priority-level concern.
Despite the amount of security tools and educational materials that have flourished over the last
year, Human Error continued to grow as a threat.
111 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide