Protecting applications and databases key to IT security, study shows

The most effective data security approach involves technology to protect applications and databases alongside traditional approaches, a study has revealed.

The most effective data security approach involves technology to protect applications and databases alongside traditional...

approaches, a study has revealed.

The conclusion is based on a survey of over 1,000 IT security professionals at multinational companies by security firm Imperva and security research firm Securosis.

Respondents rated web application firewalls, network data loss prevention, full disc encryption, server hardening, and endpoint data protection as the most successful technologies in reducing the number of data breaches.

"This survey will help security teams identify what their peers find successful and hopefully help make improvements to their own strategy and operations," said Amichai Shulman, chief technology officer at Imperva.

Malicious intentions are behind 62% of data theft with insider breaches comprising 33% and hackers 29%, while the remaining breaches were accidental, the survey found.

Nearly two-thirds of organisations either do not know whether they suffered any data breaches, or said they had not experienced any.

"This shows many companies are still not applying adequate controls on data," said Shulman.

Of those companies that were hit by data breaches, 27% saw a decline in breaches, while 46% reported the same number of breaches as the previous year.

This survey illustrates that data security as a practice is maturing, said Rich Mogull, chief analyst at Securosis.

"Given what is at stake, we are pleased to put numbers behind what we all hoped - that organisations are starting to take data security more seriously," he said.

The survey is available online to enable security professionals to compare their data security practices with other survey respondents.



Enjoy the benefits of CW+ membership, learn more and join.

Read more



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: