REPORTS
Strategy: How to Choose Multifactor Authentication

Download

How Enterprises Are Attacking the IT Security Challenge

Strategy: How to Choose Multifactor Authentication

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security technologies. But 24% of respondents don’t even measure the value of their security investments, so for many enterprises, new investment decisions may be based more on subjective opinion than hard facts.

Information security spending will range from 1% to 10% of this year’s annual IT budget for 51% of our respondents. But for some enterprises, increased spending hasn’t helped much: 15% of our respondents suffered a targeted breach or compromise costing between $500,000 and $1 million, with 6% putting the figure at $5 million or more.

Download
Table of Contents