Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 1 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

92% of infosec professionals have totally lost confidence in antivirus

by The Gurus
July 1, 2015
in Editor's News
Share on FacebookShare on Twitter

Bromium®, Inc., the pioneer of threat isolation to prevent data breaches, conducted a survey at this year’s Infosecurity Europe, where more than 125 information security professionals were asked about the greatest risks facing organisations today and the effectiveness of different solutions and architectures. The results show that while concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is shifting toward prevention-based security solutions, such as endpoint threat isolation.
“The frequency and magnitude of high-profile data breaches is causing organisations to lose faith in detection-based solutions, such as antivirus,” said Clinton Karr, senior security strategist at Bromium. “Information security professionals are turning instead to technologies that provide proactive protection, such as threat isolation, as the foundation of their security architecture.”
Highlights from the “Enterprise Security Confidence Report” include:

  • Less Confidence in Legacy Detection Solutions – An overwhelming majority of respondents (92 percent) said they have lost confidence in the ability of traditional endpoint protection solutions, such as antivirus and white listing, to detect unknown threats like zero-day attacks. Additionally, 78 percent believe antivirus is not effective against general cyber attacks.
  • Endpoint Threat Isolation is Most Effective – When asked to select from a list of security solutions, information security professionals said they consider endpoint threat isolation the most effective solution at preventing cyber threats (58 percent). Nearly one-third said network-based solutions are effective; 28 percent have faith in intrusion detection/intrusion prevention (IDS/IPS); and 27 percent think network sandboxes are effective.
  • End Users Source of Greatest Risk – Nearly two-thirds of respondents (62 percent) believe that users are one of the greatest sources of security risk. Additionally, more than one-quarter cited emerging cloud and mobile technologies that reduce IT control; 29 percent cited cloud services; and 29 percent said mobile devices among the top sources of risk.
  • Prevention is Foundation of Security – A majority of respondents (58 percent) believe that prevention, such as hardening and isolating systems, is the most foundational aspect of security architecture, compared to 23 percent who cited detection, 16 percent who cited response (investigation/remediation), and 34 percent who said predictive analytics.

According to Gartner analysts Neil MacDonald and Peter Firstbrook, in “Designing an Adaptive Security Architecture for Protection From Advanced Attacks,” published February 12, 2014, “Harden and isolate systems: We believe the foundation of any information security protection architecture should start by reducing the surface area of attack by using a combination of techniques. These techniques limit a hacker’s ability to reach systems, find vulnerabilities to target and get malware to execute.”
Bromium micro-virtualization isolates threats, reducing the attack surface to eliminate data breaches. Bromium vSentry™ automatically isolates each vulnerable user task, such as visiting a website, opening a document or accessing a USB drive. Malware entering a micro-VM cannot modify the operating system or gain access to local or enterprise data or network infrastructure. Bromium LAVA™ provides real-time security intelligence without false positives, enabling security teams to quickly analyze and respond to threats.
 

FacebookTweetLinkedIn
Tags: antivirusBromiumCyber Securityendpoint securityinfosecInfosecurity europeSurvey
ShareTweetShare
Previous Post

UK population faces Digital Amnesia as consumers struggle to recall memories trusted to connected devices

Next Post

Harvard Reveals It Had An IT Breach In June Impacting 8 Colleges And Administrations

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information