Intelligent Data Centres Issue 06 | Page 25

Pulse Secure publishes State of Enterprise Secure Access report 44% 30% Data Center + Public Cloud + Private Cloud Data Center + Public Cloud Data Center + Private Cloud 26% 20% 23% Utilize all three delivery environments Increase in Future Spend Increase in Future Spend Most Impactful Access Security Incidents Malware 55% Unauthorized/vulnerable endpoint use ulse Secure, a leading provider of software-defined secure access solutions, has published its 2019 State of Enterprise Secure Access report that quantifies threats, gaps and investment as organisations face increasing hybrid IT access challenges. P The survey of large enterprises in the US, UK and DACH uncovers business risk and impact resulting in a pivot towards extending zero trust capabilities to enable productivity and stem exposures to multi-cloud resources, applications and sensitive data. 61% 45% Top Control Gaps DevOps App Delivery Automation Defining access and protection requisites Enforcing user and device access policy IoT device and BYOD access Dynamic access authentication and protection Organizations Take Action to Resolve Hybrid IT Access Security Deficiencies 2019 State of Enterprise Secure Access Enabling Application and Data Accessibility in a World of Multi-Cloud and Zero Trust Key Enterprise Priorities 48% 46% 44% 42% 42% Improve endpoint security, remediation prior to access Enhance IoT discovery, isolation and access control New report reveals how enterprises are struggling to deal with Hybrid IT and Zero Trust access Fortify network, cloud access visibility and resource segmentation Refine privileged user or service account-based access Augment app workload delivery and protection Rising Secure Access Tech Investment Digital Transformation Increasing Hybrid IT Service Delivery 30% 44% 30% Data Center + Public Cloud + Private Cloud Data Center + Public Cloud 23% Utilize all three delivery environments Increase in Future Spend 55% Unauthorized/vulnerable endpoint use Mobile or web app exposure Unauthorized data and resource access by insecure endpoint or privileged users 61% Unauthorized app/resource access including lax authentication or encryption Considering Tool Consolidation 48% Most Impactful Access Security Incidents Malware 41% Increasing Budget by 5-15% Increasing budget Data Center + Private Cloud 26% 20% Increasing Budget by 15-25% 91% Little to modest confidence to mitigate access threats Nearly half experienced unauthorised access to data and resources due to insecure endpoints and privileged users, as well as unauthorised application access due to poor authentication or encryption controls. ◊ 46% Unauthorized app/resource access including lax authentication or encryption Little to modest confidence to mitigate access threats Increase in Future Spend Over the last 18 months, at least half of all companies across every region had dealt with malware, unauthorised/ vulnerable endpoint use and mobile or web apps exposures. 49% Unauthorized data and resource access by insecure endpoint or privileged users Key findings The global survey found the most impactful incidents were contributed by a lack of user and device access visibility and lax endpoint, authentication and authorisation access controls. 52% Mobile or web app exposure IT open to reduce number of tools and explore suites 2.8 Contributes to Visibility, Enforcement, Audit Gaps 46% 45% Access Security Tech Trends Valued Features Software Defined Perimeter Performance and Scalability DevOps App Delivery Automation Data Center and Cloud Platform Support Defining access and protection requisites User Experience, Client and Client-less Operation Enforcing user and device access policy Identity and Endpoint access management IoT device and BYOD access Larger enterprises use at least 30% more tools [NGFW, UTM, VPN, NAC, MDM] 49% Top Control Gaps 30%+ Companies on average use nearly 3 or more tools 52% Price and Ease of Administration Dynamic access authentication and protection 64% 59% Start Project within 18 Months 56% Planning Project beyond 18 Months 14% 58% 57% 56% Outsourcing Organizations Take Action to Resolve Hybrid IT Access Security Deficiencies NEARLY HALF EXPERIENCED 48% 46% UNAUTHORISED ACCESS TO DATA 44% AND RESOURCES DUE TO INSECURE 42% 42% ENDPOINTS AND PRIVILEGED USERS Key Enterprise Priorities 38% 7% Use MSSP for Secure Access Planned increase in next 24 months Improve endpoint security, remediation prior to access Enhance IoT discovery, isolation and access control Fortify network, cloud access visibility and resource segmentation Refine privileged user or service account-based access Augment app workload delivery and protection Rising Secure Access Tech Investment Remote VPN and Cloud Access 37% MDM/BYOD 37% IAM and CASB 39% NAC 35% NGFW Management 39% SDP 35% Get the full report and learn more about Hybrid IT and Zero Trust Network Access trends at www.pulsesecure.net/SESA19 “2019 State of Enterprise Secure Access” report issued May, 2019 by IDG Connect and Pulse Secure. ©2019 IDG Connect and Pulse Secure 30% www.intelligentdatacentres.com 91% Increasing budget Increasing Budget by 15-25% 41% Increasing Budget by 5-15% Considering Tool Consolidation Issue 06 25