Infoblox Infographic - Network Protection Survey Key Findings · 2019-12-16 · 4. Be Realistic...

1
RECOMMENDATIONS • Survey conducted by ReRez Research • 200 responses • Medium & large enterprises with 5,000 employees and up • HQ located in U.S. or Canada • Senior management role in IT • Broad range of IT responsibilities • We asked about adherence to network protection industry best practices • We scored their responses: Each respondent got a total score • Those with scores in the top 33 percent are “top-tier” • Those with scores in the bottom 33 percent are “bottom-tier” • We compared the top and bottom tiers: – How their practices differ – How their outcomes differ What can enterprises learn from our top-tier? There are five lessons that rose to the top: 1. Get Rid of Silos 2. Pay Attention to Operational Realities 3. Prioritize Based on Risk Analysis 4. Be Realistic about Security Staffing 5. Automate Routine Tasks Goals & Objectives 1 Outcomes Practices Top-Tier Organizations are Different Enterprise IT Top-Tier Organizations Enjoy Better Outcomes 2 3 Network Protection Survey Key Findings www.infoblox.com Making IT a Strategic Asset Compliance TOP-TIER IT Agility Reducing IT Costs Compliance BOTTOM-TIER Security Methodology Top-Tier vs. Bottom-Tier PROACTIVE ABOUT INTELLIGENCE Four times as likely to leverage machine- readable intelligence. Six times as likely to deploy an SEIM solution, and use automated tools that alert them when new devices appear on the network. Three times less likely to report being understaffed More than half have a dedicated incident response team Verses one-third of the bottom-tier VALUE DNS/DHCP DATA Roughly half use DNS/DHCP data to discover new devices Roughly half use DNS/DHCP data to discover new devices HAVE BANISHED SILOS 100% report cooperation between network, security and app teams Only 43% report similar cooperation INVEST IN SECURITY STAFF 49 % 0 % Three to four times as likely to automate routine tasks. AUTOMATE BASIC TASKS 58 % 33 % MORE AGILE More than twice as likely to say they focus more on strategic tasks than tactical BETTER VISIBILITY Four times as likely to report having complete control over their IP addressing CUSTOMER EXPERIENCE Top-Tier IT is two times as likely to have somewhat to extremely satisfied compatriots from the business, the “C”-level and users alike OPERATIONAL EFFICIENCY Twice as likely to meet SLAs Ten times as likely to remediate security events “extremely quickly” Bottom-tier report three security-incident related outages while top-tier report zero RISK MANAGEMENT ZERO Data breach: Top-tier zero, bottom-tier one ZERO

Transcript of Infoblox Infographic - Network Protection Survey Key Findings · 2019-12-16 · 4. Be Realistic...

Page 1: Infoblox Infographic - Network Protection Survey Key Findings · 2019-12-16 · 4. Be Realistic about Security Staffing 5. Automate Routine Tasks 1 Goals & Objectives Outcomes Practices

RECOMMENDATIONS

• Survey conducted by ReRez Research

• 200 responses

• Medium & large enterprises with 5,000 employees and up

• HQ located in U.S. or Canada

• Senior management role in IT

• Broad range of IT responsibilities

• We asked about adherence to network protection industry best practices

• We scored their responses: Each respondent got a total score

• Those with scores in the top 33 percent are “top-tier”

• Those with scores in the bottom 33 percent are “bottom-tier”

• We compared the top and bottom tiers:

– How their practices differ

– How their outcomes differ

What can enterprises learn from our top-tier?There are five lessons that rose to the top:

1. Get Rid of Silos

2. Pay Attention to Operational Realities

3. Prioritize Based on Risk Analysis

4. Be Realistic about Security Staffing

5. Automate Routine Tasks

Goals & Objectives1

Outcomes

PracticesTop-Tier Organizations are Different

Enterprise IT

Top-Tier Organizations Enjoy Better Outcomes

2

3

Network Protection Survey Key Findings

www.infoblox.com

Making IT aStrategic Asset

Compliance

TOP-TIER

IT Agility

ReducingIT Costs

Compliance

BOTTOM-TIER

Security

Methodology

Top-Tier vs.Bottom-Tier

PROACTIVE ABOUT INTELLIGENCE

Four times as likely to leverage machine-readable intelligence.

Six times as likely to deploy an SEIM solution, and use automated tools that alert them when new devices appear on the network.

Three times less likely to report being understaffed

More than half have a dedicated incident

response team

Verses one-third of the bottom-tier

VALUE DNS/DHCP DATA

Roughly half use DNS/DHCP data to discover new devices

Roughly half use DNS/DHCP data to discover new devices

HAVE BANISHED SILOS

100% report cooperation between network, security and app teams

Only 43% report similar cooperation

INVEST IN SECURITY STAFF 49%

0%

Three to four times as likely to automate routine tasks.

AUTOMATE BASIC TASKS

58% 33%

MORE AGILE

More than twice as likely to say they focus more on strategic tasks than tactical

BETTER VISIBILITY

Four times as likely to report having complete control over their IP addressing

CUSTOMER EXPERIENCE

Top-Tier IT is two times as likely to have somewhat to extremely satisfied compatriots from the business, the “C”-level and users alike

OPERATIONAL EFFICIENCY

Twice as likely to meet SLAs

Ten times as likely to remediate security events “extremely quickly”

Bottom-tier report three security-incident related outages while top-tier report zero

RISK MANAGEMENT

ZERO

Data breach: Top-tier zero, bottom-tier one

ZERO