manage risk but the rules keep changing! · manage risk regain control of your businesses sensitive...

1
Businesses put more on the table with every advancement in technology, so they have to MANAGE RISK Regain control of your businesses sensitive apps & data Visibility, identity & access management are key to protecting apps & data in all stages of use – no matter the cloud, network or device Share & embrace emerging technologies, & use them to your security advantage Survey Methodology The report conducted by the Ponemon Institute and sponsored by Citrix, “The Need for a New IT Security Architecture: Global Study” looked at global trends in IT security risks and reasons why security practices and policies need to evolve in order to handle threats from disruptive technologies, cybercrime and compliance mandates. The research features insights from more than 4,200 IT and IT security practitioners in Australia/New Zealand, Brazil, Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates, United Kingdom and the United States. To learn more about the findings from this survey, visit Citrix.com/secure or read the blog from Citrix Chief Security Officer, Stan Black. 83% say the complexity of business & IT operations makes them vulnerable 79% worry most about breaches of high-value information 74% say a new IT security framework is needed to improve security posture 71% say there is risk from their inability to control employees’ devices & apps 74% say there is employee complacency about security BUT THE RULES KEEP CHANGING! Data, network & app integrations are on the rise… & so are cyber attacks! Employ strong network, app & data security, as well as secure compliant enterprise file sync & share solutions An increase in data assets is UPPING THE ANTE WHAT CITRIX HELPS YOU DO Keys to reducing the security risk over the next two years in building a new IT infrastructure: 72% 73% say data management A J 76% say app management say configuration management 78% say the increase puts more information at risk The HIGH STAKES business security of

Upload: others

Post on 24-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MANAGE RISK BUT THE RULES KEEP CHANGING! · MANAGE RISK Regain control of your businesses sensitive apps & data Visibility, identity & access management are key to protecting apps

Businesses put more onthe table with every advancement

in technology, so they have to

MANAGE RISK

Regain control of your businesses sensitive apps & data

Visibility, identity & access management are key to protecting apps & data in all stages of use – no matter the cloud, network or device

Share & embrace emerging technologies, & use them to your security advantage

Survey Methodology The report conducted by the Ponemon Institute and sponsored by Citrix, “The Need for a New IT Security Architecture: Global Study” looked at global trends in IT security risks and reasons why security practices and policies need to evolve in order to handle threats from disruptive technologies, cybercrime and compliance mandates. The research features insights from more than 4,200 IT and IT security practitioners in Australia/New Zealand, Brazil, Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates, United Kingdom and the United States.

To learn more about the findings from this survey, visit Citrix.com/secure or read the blog from Citrix Chief Security Officer, Stan Black.

83% say the complexity of business & IT

operations makes them vulnerable

79%worry most

about breachesof high-value information

74% say a new IT security framework is

needed to improve security posture

71%say there is risk from

their inability to control employees’

devices & apps

74%say there is employee

complacency about security

BUT THE RULES KEEP CHANGING!

Data, network & app integrations are on the rise…

& so are cyber attacks!

Employ strong network, app & data security, as well as securecompliant enterprise file sync & share solutions

An increase in data assets is

UPPING THE ANTE

WHAT CITRIX HELPS YOU DO

Keys to reducing the security risk over the next two yearsin building a new IT infrastructure:

72%

73% say data management

AJ

76%say appmanagement

say configurationmanagement

78% say the increase puts more information at risk

The

HIGH STAKESbusiness security

of