Download - Infoblox Infographic - Network Protection Survey Key Findings · 2019-12-16 · 4. Be Realistic about Security Staffing 5. Automate Routine Tasks 1 Goals & Objectives Outcomes Practices

Transcript
Page 1: Infoblox Infographic - Network Protection Survey Key Findings · 2019-12-16 · 4. Be Realistic about Security Staffing 5. Automate Routine Tasks 1 Goals & Objectives Outcomes Practices

RECOMMENDATIONS

• Survey conducted by ReRez Research

• 200 responses

• Medium & large enterprises with 5,000 employees and up

• HQ located in U.S. or Canada

• Senior management role in IT

• Broad range of IT responsibilities

• We asked about adherence to network protection industry best practices

• We scored their responses: Each respondent got a total score

• Those with scores in the top 33 percent are “top-tier”

• Those with scores in the bottom 33 percent are “bottom-tier”

• We compared the top and bottom tiers:

– How their practices differ

– How their outcomes differ

What can enterprises learn from our top-tier?There are five lessons that rose to the top:

1. Get Rid of Silos

2. Pay Attention to Operational Realities

3. Prioritize Based on Risk Analysis

4. Be Realistic about Security Staffing

5. Automate Routine Tasks

Goals & Objectives1

Outcomes

PracticesTop-Tier Organizations are Different

Enterprise IT

Top-Tier Organizations Enjoy Better Outcomes

2

3

Network Protection Survey Key Findings

www.infoblox.com

Making IT aStrategic Asset

Compliance

TOP-TIER

IT Agility

ReducingIT Costs

Compliance

BOTTOM-TIER

Security

Methodology

Top-Tier vs.Bottom-Tier

PROACTIVE ABOUT INTELLIGENCE

Four times as likely to leverage machine-readable intelligence.

Six times as likely to deploy an SEIM solution, and use automated tools that alert them when new devices appear on the network.

Three times less likely to report being understaffed

More than half have a dedicated incident

response team

Verses one-third of the bottom-tier

VALUE DNS/DHCP DATA

Roughly half use DNS/DHCP data to discover new devices

Roughly half use DNS/DHCP data to discover new devices

HAVE BANISHED SILOS

100% report cooperation between network, security and app teams

Only 43% report similar cooperation

INVEST IN SECURITY STAFF 49%

0%

Three to four times as likely to automate routine tasks.

AUTOMATE BASIC TASKS

58% 33%

MORE AGILE

More than twice as likely to say they focus more on strategic tasks than tactical

BETTER VISIBILITY

Four times as likely to report having complete control over their IP addressing

CUSTOMER EXPERIENCE

Top-Tier IT is two times as likely to have somewhat to extremely satisfied compatriots from the business, the “C”-level and users alike

OPERATIONAL EFFICIENCY

Twice as likely to meet SLAs

Ten times as likely to remediate security events “extremely quickly”

Bottom-tier report three security-incident related outages while top-tier report zero

RISK MANAGEMENT

ZERO

Data breach: Top-tier zero, bottom-tier one

ZERO