SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
REPORT
www.fortinet.com	 1
Wireless Security Trends: State of the Market
Enterprise-wide security is an integral part of any IT strategy and
implementation. Growing threats to data center and network infrastructures,
communications and applications require end-to-end security for maximum
protection. This survey report provides an overview of the key security
challenges faced by enterprise IT decision-makers in an ever-changing,
globally networked ecosystem.
Key Findings
Wireless LAN Vulnerability Remains Top of Mind
The threat landscape is evolving. With the dynamics of an unrelenting increase in
number and type of networked devices, IT decision-makers believe their WLANs are
exposed. Despite implementation of a broad range of security measures, wireless LAN
infrastructure and access are considered to be at the greatest risk to security breaches.
Enterprise IoT Applications Are Mission Critical
From the factory floor to the hospital recovery room, networked Internet of Things
(IoT) devices range from industrial robotics to advanced medical sensors. They are
being deployed in huge numbers for a wide range of innovative and game-changing
applications. These new types of wireless devices can generate massive amounts
of critical data and network traffic on a daily basis. This creates a new set of security
challenges for IT managers.
Adoption of Cloud-Managed Wi-Fi Continues to Grow
Especially in distributed enterprises, the migration from on-premise to cloud-managed
WLANs is gaining momentum. Cloud Wi-Fi provides simplified deployment, management,
visibility and control. It also brings the need for a different approach to WLAN security:
requiring access points to run a broad set of protection measures in real time.
Wireless Security Survey 2016 The Need for Integrated
Security
Enterprise organizations want a
secure architecture that provides
flexible end-to-end protection
across their entire IT environment.
With high-profile attacks on major
organizations, cybersecurity and the
protection of critical company and
customer data are top concerns.
Most survey respondents—79%—
expect an integrated architecture
to address the challenges of
cybersecurity while also enabling
secure network access.
Not surprisingly, the large majority
of enterprises surveyed have
implemented some form of firewall,
authentication and antivirus. In
a significant change from last
year, there is notable growth in
the implementation of intrusion
protection and application
awareness/control worldwide.
While enterprises do believe they
need an end-to-end security
infrastructure, they may find that
deploying an integrated solution is
difficult to configure, deploy and
manage. Many security holes are
the result of incorrect setup; often
a result of products with different
management and control systems.
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
www.fortinet.com	 2
This global survey looks at the state of the market for WLAN
security among enterprises across a broad range of industries.
All respondents were sourced from the independent market
research company Lightspeed GMI online paneli
and were
customers of all the major WLAN equipment vendors.
Respondent Profiles
The findings of this report come from an independent survey
of 1,300 IT decision-makers (ITDMs) in 11 countries. It is the
second of our annual security surveys representing the input of
enterprise organizations. The report comprises a broad spectrum
of industries including manufacturing, telecommunications,
financial services, education, public sector and more.
FIGURE 1: STRUCTURE OF THE SAMPLE
Ongoing Worries Over Wireless Security
Enterprise IT decision-makers continue to have concerns
with their wireless LAN security. There is little change from last
year’s survey, with 45% of the 2016 study respondents stating
the loss of company and customer data to be the top risk.
Industrial espionage remains second on the list with 24% of
ITDMs stating this is their top risk. These enterprises may already
be experiencing breaches and they are taking more action to
remedy security gaps across their IT infrastructure.
People have come to expect pervasive Wi-Fi access for
personal and professional devices, making BYOD seem like a
well-accepted business practice. However, there is a significant
regional difference in regards to BYOD support and its related
IT access control. Worldwide, only 56% of ITDMs indicated
that BYOD is allowed in their organizations. However, in North
America 67% allow BYOD access, and 72% of respondents
expect IT to have complete control of all employee devices.
FIGURE 2: BIGGEST RISK
FIGURE 3: LEVEL OF SECURITY VULNERABILITY
Compare this to EMEA, where only
46% allow BYOD and 63% expect
IT to have complete control.
This reflects a significant lack of
confidence in IT’s ability to securely
control access, especially among
European and Asian respondents,
where only 41% believe they have
very secure access in place.
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
www.fortinet.com	 3
Enterprises Are Increasing Wireless
Security Measures
In face of these risks, enterprise organizations are increasing
their deployment of security solutions across the enterprise. They
consider their WLANs to be most vulnerable and are investing
in broader security architectures. Compared to last year, the
2016 study shows a more balanced mix of security methods.
Interestingly, the implementation of intrusion protection systems
grew 45% year over year, while application awareness and
control deployments grew a whopping 60%.
Function 2015 2016 % Growth
Firewall 71% 84% 18%
Authentication 63% 77% 21%
Antivirus 61% 72% 17%
IPS 41% 60% 45%
App Awareness/Control 37% 59% 60%
FIGURE 4: IMPLEMENTATION OF SECURITY FEATURES
This trend toward a broader range of security coverage is a
positive change. However, it may also lead to implementation
challenges such as complex integration, management and
control of multi-vendor solutions. This greatly compromises
IT’s ability to tackle threats since it lacks a cohesive integration
of security products. As a result, enterprises cannot effectively
close the gaps between these “islands” of security solutions.
In fact, ITDMs indicate a huge desire for an enterprise-wide
security architecture that combines cybersecurity with
access while enabling segmentation across wired and
wireless networks. It is counterproductive to deploy a
fragmented wireless security solution that cannot share
information with the rest of the network or monitor just one
segment of the infrastructure. In addition, dealing with multiple
management interfaces is time-consuming and makes for
problematic troubleshooting.
FIGURE 5: SECURE ACCESS ARCHITECTURE : FEATURES AND FUNCTIONALITY
The Internet of Things Is Here in a Big Way
The IoT has become mission critical in enterprise organizations
for most every vertical market. Globally, more than half
of ITDMs indicated they have deployed business-critical
IoT applications. More striking is in North America, where
76% of the respondents said they are using IoT equipment
for innovative applications. Smart sensors are becoming
ubiquitous. In healthcare, they may save lives. In manufacturing,
they can improve quality and lower cost. In process control, IoT
equipment and applications increase safety and enable
real-time monitoring. We find many IoT applications in “smart”
cities and transportation systems of all types.
IoT devices present big security challenges. Typically appliances
and sensors are used for data collection and transfer. Most of
these devices are unsecured and unable to support common
client-based security solutions. As a result, almost one-half
of IT decision-makers are worried about the challenges of
securing IoT devices. In North America, where we see the most
enterprise IoT deployments, 56% of the respondents are “very”
and 39% are “somewhat” concerned. Not surprisingly, 80%
of ITDMs are now including IoT as a major component of their
overall security strategy.
FIGURE 6: LEVEL OF CONCERN OVER INTERNET OF THINGS SECURITY
SURVEY REPORT: WIRELESS SECURITY SURVEY 2016
The Migration to Cloud-Managed WLAN Continues
In general, IT executives are becoming more comfortable
with cloud-managed service models. Over one-half of the
respondents prefer cloud-based solutions over on-premise
wireless LAN management and control. There are a number
of reasons that distributed enterprises, in particular, are
implementing cloud-managed Wi-Fi. Gravitation from CAPEX- to
OPEX-based models is a major driver. With cloud-managed Wi-
Fi, scaling the network involves just the cost of additional access
points and subscription fees. For deployment in branch offices,
where on-site expertise is limited, it saves time and resources.
Centralized management and control without regard to location
assures network reliability and uptime.
However, security concerns may hold back customers from
migrating to cloud-managed Wi-Fi. In some ways, cloud WLAN
security requirements are greater than on-premise systems, yet
can be even more secure than equivalent on-premise solutions.
FIGURE 7: WIRELESS NETWORK MANAGING
Fortinet Secure Access Architecture
With these trends and challenges, the deployment and
management of enterprise networks, applications and devices
must be simplified. Even with a broad range of security
measures in place, IT managers may be uncertain about optimal
configurations. Multi-vendor deployments are difficult to set up,
integrate and manage.
With our Secure Access Architecture, Fortinet leads the way in
solving these challenges by providing customers the integrated
security solution they need and want. SAA was developed
to deliver scalable, end-to-end security across the wired and
wireless access layer to guard against data breaches and
cybersecurity threats.
FIGURE 8: SECURE ACCESS ARCHITECTURE
Fortinet Security Fabric is the most comprehensive and flexible architecture
covering all deployment options and network segmentations. SAA addresses
the challenges and concerns of IT for securing their wireless infrastructure,
giving peace of mind that your network is secure, stable, and reliable.
i
The Fortinet Wireless Security Survey was a research exercise undertaken in March 2016 by the market research company Lightspeed GMI. The survey was conducted online
among 1,300 qualified IT decision-makers—predominantly CIOs, CTOs, IT Directors and Heads of IT—in Enterprise organizations around the globe. Eleven countries were included
in the survey: Australia, Canada, France, Germany, Hong Kong, Italy, Japan, Singapore, Spain, the UK and USA.
Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet®
, FortiGate®
, FortiCare®
and FortiGuard®
, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.
GLOBAL HEADQUARTERS
Fortinet Inc.
899 Kifer Road
Sunnyvale, CA 94086
United States
Tel: +1.408.235.7700
www.fortinet.com/sales
EMEA SALES OFFICE
905 rue Albert Einstein
Valbonne
06560, Alpes-Maritimes,
France
Tel +33 4 8987 0500
APAC SALES OFFICE
300 Beach Road 20-01
The Concourse
Singapore 199555
Tel: +65.6513.3730
LATIN AMERICA SALES OFFICE
Paseo de la Reforma 412 piso 16
Col. Juarez
C.P. 06600
México D.F.
Tel: 011-52-(55) 5524-8428
May 2, 2016

Weitere ähnliche Inhalte

Was ist angesagt?

“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsIron Mountain
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM Events
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 

Was ist angesagt? (20)

“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 

Ähnlich wie Wireless survey-report-saa-2016

Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdfpavanjanawade1
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 

Ähnlich wie Wireless survey-report-saa-2016 (20)

Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdf
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Wireless survey-report-saa-2016

  • 1. REPORT www.fortinet.com 1 Wireless Security Trends: State of the Market Enterprise-wide security is an integral part of any IT strategy and implementation. Growing threats to data center and network infrastructures, communications and applications require end-to-end security for maximum protection. This survey report provides an overview of the key security challenges faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem. Key Findings Wireless LAN Vulnerability Remains Top of Mind The threat landscape is evolving. With the dynamics of an unrelenting increase in number and type of networked devices, IT decision-makers believe their WLANs are exposed. Despite implementation of a broad range of security measures, wireless LAN infrastructure and access are considered to be at the greatest risk to security breaches. Enterprise IoT Applications Are Mission Critical From the factory floor to the hospital recovery room, networked Internet of Things (IoT) devices range from industrial robotics to advanced medical sensors. They are being deployed in huge numbers for a wide range of innovative and game-changing applications. These new types of wireless devices can generate massive amounts of critical data and network traffic on a daily basis. This creates a new set of security challenges for IT managers. Adoption of Cloud-Managed Wi-Fi Continues to Grow Especially in distributed enterprises, the migration from on-premise to cloud-managed WLANs is gaining momentum. Cloud Wi-Fi provides simplified deployment, management, visibility and control. It also brings the need for a different approach to WLAN security: requiring access points to run a broad set of protection measures in real time. Wireless Security Survey 2016 The Need for Integrated Security Enterprise organizations want a secure architecture that provides flexible end-to-end protection across their entire IT environment. With high-profile attacks on major organizations, cybersecurity and the protection of critical company and customer data are top concerns. Most survey respondents—79%— expect an integrated architecture to address the challenges of cybersecurity while also enabling secure network access. Not surprisingly, the large majority of enterprises surveyed have implemented some form of firewall, authentication and antivirus. In a significant change from last year, there is notable growth in the implementation of intrusion protection and application awareness/control worldwide. While enterprises do believe they need an end-to-end security infrastructure, they may find that deploying an integrated solution is difficult to configure, deploy and manage. Many security holes are the result of incorrect setup; often a result of products with different management and control systems.
  • 2. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 www.fortinet.com 2 This global survey looks at the state of the market for WLAN security among enterprises across a broad range of industries. All respondents were sourced from the independent market research company Lightspeed GMI online paneli and were customers of all the major WLAN equipment vendors. Respondent Profiles The findings of this report come from an independent survey of 1,300 IT decision-makers (ITDMs) in 11 countries. It is the second of our annual security surveys representing the input of enterprise organizations. The report comprises a broad spectrum of industries including manufacturing, telecommunications, financial services, education, public sector and more. FIGURE 1: STRUCTURE OF THE SAMPLE Ongoing Worries Over Wireless Security Enterprise IT decision-makers continue to have concerns with their wireless LAN security. There is little change from last year’s survey, with 45% of the 2016 study respondents stating the loss of company and customer data to be the top risk. Industrial espionage remains second on the list with 24% of ITDMs stating this is their top risk. These enterprises may already be experiencing breaches and they are taking more action to remedy security gaps across their IT infrastructure. People have come to expect pervasive Wi-Fi access for personal and professional devices, making BYOD seem like a well-accepted business practice. However, there is a significant regional difference in regards to BYOD support and its related IT access control. Worldwide, only 56% of ITDMs indicated that BYOD is allowed in their organizations. However, in North America 67% allow BYOD access, and 72% of respondents expect IT to have complete control of all employee devices. FIGURE 2: BIGGEST RISK FIGURE 3: LEVEL OF SECURITY VULNERABILITY Compare this to EMEA, where only 46% allow BYOD and 63% expect IT to have complete control. This reflects a significant lack of confidence in IT’s ability to securely control access, especially among European and Asian respondents, where only 41% believe they have very secure access in place.
  • 3. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 www.fortinet.com 3 Enterprises Are Increasing Wireless Security Measures In face of these risks, enterprise organizations are increasing their deployment of security solutions across the enterprise. They consider their WLANs to be most vulnerable and are investing in broader security architectures. Compared to last year, the 2016 study shows a more balanced mix of security methods. Interestingly, the implementation of intrusion protection systems grew 45% year over year, while application awareness and control deployments grew a whopping 60%. Function 2015 2016 % Growth Firewall 71% 84% 18% Authentication 63% 77% 21% Antivirus 61% 72% 17% IPS 41% 60% 45% App Awareness/Control 37% 59% 60% FIGURE 4: IMPLEMENTATION OF SECURITY FEATURES This trend toward a broader range of security coverage is a positive change. However, it may also lead to implementation challenges such as complex integration, management and control of multi-vendor solutions. This greatly compromises IT’s ability to tackle threats since it lacks a cohesive integration of security products. As a result, enterprises cannot effectively close the gaps between these “islands” of security solutions. In fact, ITDMs indicate a huge desire for an enterprise-wide security architecture that combines cybersecurity with access while enabling segmentation across wired and wireless networks. It is counterproductive to deploy a fragmented wireless security solution that cannot share information with the rest of the network or monitor just one segment of the infrastructure. In addition, dealing with multiple management interfaces is time-consuming and makes for problematic troubleshooting. FIGURE 5: SECURE ACCESS ARCHITECTURE : FEATURES AND FUNCTIONALITY The Internet of Things Is Here in a Big Way The IoT has become mission critical in enterprise organizations for most every vertical market. Globally, more than half of ITDMs indicated they have deployed business-critical IoT applications. More striking is in North America, where 76% of the respondents said they are using IoT equipment for innovative applications. Smart sensors are becoming ubiquitous. In healthcare, they may save lives. In manufacturing, they can improve quality and lower cost. In process control, IoT equipment and applications increase safety and enable real-time monitoring. We find many IoT applications in “smart” cities and transportation systems of all types. IoT devices present big security challenges. Typically appliances and sensors are used for data collection and transfer. Most of these devices are unsecured and unable to support common client-based security solutions. As a result, almost one-half of IT decision-makers are worried about the challenges of securing IoT devices. In North America, where we see the most enterprise IoT deployments, 56% of the respondents are “very” and 39% are “somewhat” concerned. Not surprisingly, 80% of ITDMs are now including IoT as a major component of their overall security strategy. FIGURE 6: LEVEL OF CONCERN OVER INTERNET OF THINGS SECURITY
  • 4. SURVEY REPORT: WIRELESS SECURITY SURVEY 2016 The Migration to Cloud-Managed WLAN Continues In general, IT executives are becoming more comfortable with cloud-managed service models. Over one-half of the respondents prefer cloud-based solutions over on-premise wireless LAN management and control. There are a number of reasons that distributed enterprises, in particular, are implementing cloud-managed Wi-Fi. Gravitation from CAPEX- to OPEX-based models is a major driver. With cloud-managed Wi- Fi, scaling the network involves just the cost of additional access points and subscription fees. For deployment in branch offices, where on-site expertise is limited, it saves time and resources. Centralized management and control without regard to location assures network reliability and uptime. However, security concerns may hold back customers from migrating to cloud-managed Wi-Fi. In some ways, cloud WLAN security requirements are greater than on-premise systems, yet can be even more secure than equivalent on-premise solutions. FIGURE 7: WIRELESS NETWORK MANAGING Fortinet Secure Access Architecture With these trends and challenges, the deployment and management of enterprise networks, applications and devices must be simplified. Even with a broad range of security measures in place, IT managers may be uncertain about optimal configurations. Multi-vendor deployments are difficult to set up, integrate and manage. With our Secure Access Architecture, Fortinet leads the way in solving these challenges by providing customers the integrated security solution they need and want. SAA was developed to deliver scalable, end-to-end security across the wired and wireless access layer to guard against data breaches and cybersecurity threats. FIGURE 8: SECURE ACCESS ARCHITECTURE Fortinet Security Fabric is the most comprehensive and flexible architecture covering all deployment options and network segmentations. SAA addresses the challenges and concerns of IT for securing their wireless infrastructure, giving peace of mind that your network is secure, stable, and reliable. i The Fortinet Wireless Security Survey was a research exercise undertaken in March 2016 by the market research company Lightspeed GMI. The survey was conducted online among 1,300 qualified IT decision-makers—predominantly CIOs, CTOs, IT Directors and Heads of IT—in Enterprise organizations around the globe. Eleven countries were included in the survey: Australia, Canada, France, Germany, Hong Kong, Italy, Japan, Singapore, Spain, the UK and USA. Copyright © 2016 Fortinet, Inc. All rights reserved. Fortinet® , FortiGate® , FortiCare® and FortiGuard® , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. GLOBAL HEADQUARTERS Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 United States Tel: +1.408.235.7700 www.fortinet.com/sales EMEA SALES OFFICE 905 rue Albert Einstein Valbonne 06560, Alpes-Maritimes, France Tel +33 4 8987 0500 APAC SALES OFFICE 300 Beach Road 20-01 The Concourse Singapore 199555 Tel: +65.6513.3730 LATIN AMERICA SALES OFFICE Paseo de la Reforma 412 piso 16 Col. Juarez C.P. 06600 México D.F. Tel: 011-52-(55) 5524-8428 May 2, 2016