Almost all modern enterprises are stuck with similar information security pain points. IT infrastructure is now more complex than ever due to the increased diversity of endpoint operating systems, increasing network connectivity and cloud adoption and increases in mobility. The percentage of organisations formally endorsing BYOD initiatives is expected to skyrocket from 31 percent in 2014 to 77 percent in 2016.
A “2014 Cyberthreat Defence Report” by CyberEdge Group was underwritten by nine firms across the network security world and revealed that network access control (NAC) was rated the most effective security technology in defending against cyber threats.
The study picked the brains of 763 IT security professionals about their practices, their security preparedness and how effective their current security technologies are. The participants rated the effectiveness of various cybersecurity solutions on a scale of one to five, and NAC received the highest ranking of 3.71.
The research dug up that 77 percent are already using or plan to use network access control as part of a mobile security strategy. Also, NAC was named the most often used technology (53 percent) to detect host security misconfigurations as well as mobile device vulnerabilities (51 percent).
The findings also shed light on the need for continuous monitoring and mitigation in an enterprise setting with more than 60 percent of participants experiencing a breach at some point in 2013. A quarter of respondents also felt their employers weren’t investing enough in adequate defences, contributing to the alarming number of hacks.
So what does this mean for the future of network and information security?
To address common security challenges, many organisations are now supplementing their existing security products with pervasive network security technologies, like NAC, to dynamically view and control user, device, application and access diversity.
Organisations are also moving towards more integrated security systems. The CyberEdge researchers found that most respondent organisations are meshing multiple technologies together to create a more unified security system that better meets their specific needs.