Page 29 - Cyber Defense eMagazine - September 2017
P. 29

2. Deployment Maturity ∆ 2015 - 2017

               Respondents indicated the deployment phase of key security technologies, and for each
               solution category, the leading answer was “not planned.”  Solutions included in the
               Development Maturity question included:


                   •  Data Loss Prevention (DLP):
                          o  Deployment not planned: 24% in 2015, 29% in 2016, 37% in 2017
                   •  Identity and Access Management (IAM):
                          o  Deployment not planned: 26% in 2015, 32% in 2016, 29% in 2017
                   •  Privileged Identity Management (PIM):
                          o  Deployment not planned: 28% in 2015, 42% in 2016, 35% in 2017
                   •  Security Information and Event Management (SIEM):
                          o  Deployment not planned: 32% in 2015, 36% in 2016, 29% in 2017
                   •  User Entity Behavior Analytics (UEBA):
                          o  Deployment not planned 49% in 2016, 44% in 2017


               Of those five security technologies, IAM and SIEM were the most widely accepted/deployed at
               this time, while, unsurprisingly, UEBA is the least mature.


               3. Greatest Threats to Organizational Data

               STEALTHbits found that from 2016 to 2017, the four most prevalent threats -- Human Error,
               Abuse of Privileges, Malicious Code/Viruses, and Advanced Persistent Threats -- continued to
               grow in concern at a steady rate.  However, unlike previous years, respondents did not rank


                    29   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   24   25   26   27   28   29   30   31   32   33   34