1. Market Research
  2. > Aerospace and Defence Market Trends
  3. > Turning the Tables on Cyber Threats

Turning the Tables on Cyber Threats

  • September 2014
  • -
  • Frost & Sullivan
  • -
  • 8 pages

The bad guys are getting better quicker than the good guys are improving, despite the good guys’ proclivity to spend to keep the bad guys out. This situation prompts Stratecast to question whether security expenditures are being directed optimally. In other words, is spending rational? If not, is there a lack of more effective security solutions? Or, if available, are they not being purchased and used at a level to have a material impact? Finally, if insufficient purchases and use of more effective security solutions is the culprit, what are the restraints and how can they be reduced? With the focus on these questions, we examine a pair of offerings from RSA: Web Threat Detection (WTD) and Enterprise Compromise Assessment Tool (ECAT).

Introduction
In the constant struggle by public and private organizations to defend against cyber threats, the attackers are winning. Evidence of this winning abounds. Instances of data breaches, privacy violations, and network intrusions are routinely chronicled in the public press. In an effort to stem the tide, spending on security solutions of various types continues to increase year-over-year.2 Also, the bi-annual surveys of information security professionals sponsored by (ISC)2 and conducted by Frost & Sullivan show a similar and recurring upward trend in security spending.3 Whether that spending is on personnel, training, hardware and software solutions, outsourcing, or a combination of all of these, the majority of survey respondents state that an increase in security spending is inescapable.

In this battle of good versus bad, the good guys are losing. To a degree, this is to be expected. The digitized world is constantly expanding in all conceivable measurements: bandwidth, bits exchanged, files created, active endpoint devices, and data center environments. The bad guys know full well that in this expanding, as well as dynamic, digital world, defenses are only as good as the weakest links in the chain. According to Verizon in its annual data breach investigation reports, finding the weak links, and even the absence of a chain, and then mounting an exploit is the stock and trade of the perpetrators—and they are very adept.4 Also, the same types of successful exploits are used year-over-year; some with little modification from the past and others at a new tier of sophistication. Casting a more dire perspective, the gap between the time for a compromise to take root and then to be discovered is growing.5 In other words, the bad guys are getting better quicker than the good guys are improving, despite the good guys’ proclivity to spend to keep the bad guys out.

This situation prompts Stratecast to question whether security expenditures are being directed optimally. In other words, is spending rational—that is, driven to where the most good can be attained? If not, is there a lack of more effective security solutions? Or, if available, are they not being purchased and used at a level to have a material impact? Finally, if insufficient purchases and use of more effective security solutions is the culprit, what are the restraints and how can they be reduced? With the focus on these questions, we examine a pair of offerings from RSA: Web Threat Detection (WTD) and Enterprise Compromise Assessment Tool (ECAT).

Table Of Contents

Turning the Tables on Cyber Threats

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Ahmad

+1 718 618 4302

Purchase Reports From Reputable Market Research Publishers
Global Defense Spends on Homeland Security, 2016 to 2025

Global Defense Spends on Homeland Security, 2016 to 2025

  • $ 9999
  • Industry report
  • August 2016
  • by Strategic Defence Intelligence (SDI)

Summary Strategic Defense Intelligence in its report "Global Defense Spends on Homeland Security, 2016 to 2025" has considered Homeland security (HLS) to include protection of a Global's civilians and ...

Europe Defense Spends on C4ISR Electronics and IT: 2016 to 2024

Europe Defense Spends on C4ISR Electronics and IT: 2016 to 2024

  • $ 7999
  • Industry report
  • August 2016
  • by Strategic Defence Intelligence (SDI)

Summary Strategic Defense Intelligence in its report "Europe Defense Spends on C4ISR Electronics and IT: 2016 to 2024" provides quantitative top-level view of projected spends on C4ISR Electronics and ...

Global Defense Spends (Air Force, Army and Navy) - 2012 to 2020

Global Defense Spends (Air Force, Army and Navy) - 2012 to 2020

  • $ 7999
  • Industry report
  • August 2016
  • by Strategic Defence Intelligence (SDI)

Summary Strategic Defense Intelligence in its report "Global Defense Spends (Air Force, Army and Navy) - 2012 to 2020" has considered Revenue Expenditure which includes troop training, institutional education, ...


ref:plp2014

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.