Protecting applications and databases key to IT security, study shows


Protecting applications and databases key to IT security, study shows

Warwick Ashford

The most effective data security approach involves technology to protect applications and databases alongside traditional approaches, a study has revealed.

The conclusion is based on a survey of over 1,000 IT security professionals at multinational companies by security firm Imperva and security research firm Securosis.

Respondents rated web application firewalls, network data loss prevention, full disc encryption, server hardening, and endpoint data protection as the most successful technologies in reducing the number of data breaches.

"This survey will help security teams identify what their peers find successful and hopefully help make improvements to their own strategy and operations," said Amichai Shulman, chief technology officer at Imperva.

Malicious intentions are behind 62% of data theft with insider breaches comprising 33% and hackers 29%, while the remaining breaches were accidental, the survey found.

Nearly two-thirds of organisations either do not know whether they suffered any data breaches, or said they had not experienced any.

"This shows many companies are still not applying adequate controls on data," said Shulman.

Of those companies that were hit by data breaches, 27% saw a decline in breaches, while 46% reported the same number of breaches as the previous year.

This survey illustrates that data security as a practice is maturing, said Rich Mogull, chief analyst at Securosis.

"Given what is at stake, we are pleased to put numbers behind what we all hoped - that organisations are starting to take data security more seriously," he said.

The survey is available online to enable security professionals to compare their data security practices with other survey respondents.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy