Guest Column | January 26, 2015

In 2014 Hacking Surge Wake, Survey Shows Network Security Priorities In 2015

By Adam Boone, CMO, Certes Networks

IT departments were battered by a cybersecurity perfect storm in 2014.

While the security community was still roiling in the wake of the Target breach in late 2013, the continuing parade of breaches in 2014 cast a harsh light on inadequate security architectures and poorly implemented security practices.

At the same time, the aggregate costs of data breaches escalated dramatically, as enterprises and payment card issuing institutions faced costs in the billions of dollars in breach response, cleanup, damaged reputations, stolen intellectual property, lawsuits, and lost market valuation. The hacking crisis played out in mainstream media headlines, and top executives lost their jobs in the aftermath of breaches. Now a recent court decision has cleared the way for banks to sue Target over its credit card breach.

In this environment, it’s no surprise that enterprise IT budgeting and project priorities will be shaped by the security tumult of last year.

In November 2014, Certes Networks commissioned Spiceworks to conduct a survey of IT decision-makers to understand their challenges with protecting data traffic and to get a look at their IT security plans for 2015.

The global survey focused on general IT managers, not the security personnel at these enterprises. The 150 respondents at a spectrum of company types and sizes hold responsibilities across the range of IT disciplines, including applications, networking, and end-point management as well as security.

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights