Network attacks may be increasingly inevitable, but 83% of enterprises say they are unprepared for them, according to new research from Arbor Networks.
In conjunction with the Economist Intelligence Unit, Arbor Networks surveyed 360 senior business leaders across the globe about the readiness for cyberattacks. The results indicated that they aren't all that ready for attacks, a scary finding since Arbor says that attacks are inevitable and more sophisticated than ever.
In fact, 77% of respondents said they have had an "incident" in the past two years, and 38% have no response plans if future incidents occur. Only 17% of businesses said they were fully prepared for an online security incident, with most leaning on their IT departments to take the lead.
Not surprisingly, security firm Arbor Networks has a way to help enterprises get prepared. The survey results are timed with the launch of Arbor's Prevail Security Analytics, the first product to spring from its acquisition of Packetloop last September.
Arbor describes the big-data platform (cloud-based or on-premises) as a "DVR" for network security, letting enterprises see live network traffic data and play, pause, or rewind it as needed for threat detection, incident response, and security forensics. Tuning in can show them not only when they've been breached, but how they were breached and what systems were affected. (See Defending the Mobile Core.)
Arbor isn't the only one currently making waves in network security:
Nokia Networks is opening a Mobile Broadband Security Center in Berlin at which its operator customers, business and research partners, and public authorities can discuss telco-centric security research on mobile broadband. The center will be open for business in the later part of 2014. (See NSN Plans Mobile Broadband Security Center in Berlin.)
Deutsche Telekom AG (NYSE: DT) is also jumping on the trend of building a dedicated center for security issues. The carrier is opening an intelligent cyberdefense center at the end of the year to identify cyberattacks "significantly earlier than was previously possible." It's working with Deutsche Telekom's Cyber Emergency Response Team (CERT) to provide network monitoring at the center and with T-Systems International GmbH to develop new cyber-security services.
Revenue management vendor CSG Systems International Inc. (Nasdaq: CSGS) has launched CSG Invotas, a new services division focused on enterprise security. The company says Invotas provides "proven automation and orchestration solutions to respond in real time to emerging and ongoing cyber attacks." (See CSG Intros Enterprise Security Business.)
Re: Surprised I think IT departments take some steps to protect their data and networks, but the crime is so sophisticated that it's hard to be prepared on their level. Target is a good, high-profile example of that.
AT&T Speaking of operators talking about security, I just got an email from AT&T warning about malware from celebrity searches:
"Cybercriminals use the names of popular celebrities to lure people to sites with malicious software. For instance, when you search for pictures and downloads of Britney Spears or Kathy Griffin you have about a 10% chance of landing on a page that tested positive for spam, adware, viruses, or other malware."
I think talking about what they are doing to prevent cyber-crime and what you should be doing to do so on your end is only a good thing. If the attitude is that it's inevitable, they should be talking more about how to prevent it or, at least, lessen the impact of it.
pdonegan67, User Rank: Light Sabre 3/19/2014 | 9:43:10 AM
Re: hush hush security That would definitely be a step in the right direction but legislative change is also required to loosen up some of the restrictions on carriers sharing attack information Yes it's fraught, yes it can only be done very gingerly, but the status quo is clearly in everybody's worst interests.
mmmmmj, User Rank: Light Beer 3/19/2014 | 3:19:39 AM
Re: hush hush security What I see evovling with the likes of solutions from Elastica and others is a way for organizations to share their breaches anonymously and to receive "sanitized"alerts from other organizations. As organizations start to see the benefit of "receiving" they will be more willing to 'giving"
Surprised I was surprised to hear 80+ percent of respondents say they're unprepared for security breaches. That's shocking. Although I suppose in the wake of last year's Target and Neiman-Marcus breaches, I ought not to be shocked.
Re: hush hush security For sure. I heard the MWC breakfast was a great, productive discussion, but they locked us media types (even their own!) out to create a safe environment to chat about these issues.
mendyk, User Rank: Light Sabre 3/18/2014 | 4:34:12 PM
Re: hush hush security There's no doubt that security is something that all network operators want to hear about, but few are willing to talk about. Patrick Donegan is doing a good job of getting at least some operators to open up about mobile security issues. His conferences are well worth attending, even if you aren't ready to step up to the microphone.
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.