Global Key Findings

Investments in Breach Prevention Rise Despite Increased Breaches, Low Confidence in Ability to Prevent Breaches and Unauthorized User Access

A widening gap is emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Despite an exponential growth in the number of data breaches and high commercial impact, the research reveals increasing levels of investment. Some of the interesting facts include:



Download the full Global Report here

  • While 87% of IT decision-makers feel their organizationís perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach
  • 33% think unauthorized users are still able to access their networks and 34% are not confident in the security of their organizationís data should a breach occur
  • 90% of organizations suffered negative commercial consequences as a result of data breaches
  • And of the most recent experience, the average amount of breached data protected by encryption was below 8%, highlighting the need for a more robust data protection strategy

Global Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 26%
  • 22%
  • 22%
  • 21%
  • 18%
  • 17%
  • 17%
  • 16%
  • 14%
  • 13%
  • 5%


* Attacks by employees and customers; Cracks; Customer information was compromised; Cyber security attacks; Gateway attack; I cannot disclose; Internal activity; Physical tampering/intrusion (x2); Root kits; Don't know (x2); No response (x62)

What was the source of your most recent breach?

  • 57%
  • 36%
  • 32%
  • 21%
  • 13%
  • 3%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 31%
  • 30%
  • 28%
  • 24%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (87%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, a third (33%) think unauthorized users are able to access their organizationís network and a similar number (34%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 30% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 8%. The most common forms of respondentsí organizationís perimeter security system breaches are viruses (76%) and malware (74%).
  • Nine in ten respondentsí organizations (90%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (31%).

Global Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 90%
  • 78%
  • 74%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 64%
  • 58%
  • 53%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 75%
  • 55%
  • 61%
  • Close to three quarters (72%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (8%) seeing a decrease in investment.
  • On average, almost 9% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (8%) is spent on data protection.
  • The majority of respondents (73%) think their organization invests enough in security and five in six (83%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, nearly half (48%) would allocate the most spend to data security while a third (32%) would allocate the most to perimeter security.

Global Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (75%), resources (55%) and time (61%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (24%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • One in every six (15%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around three out of five respondents (62%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (71%) organizationís to adjust their security strategy.

USA Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 28%
  • 24%
  • 24%
  • 24%
  • 23%
  • 19%
  • 18%
  • 17%
  • 17%
  • 14%
  • 7%

What was the source of your most recent breach?

  • 69%
  • 24%
  • 25%
  • 24%
  • 15%
  • 1%
  • 2%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 36%
  • 26%
  • 32%
  • 18%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (94%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, 29% think unauthorized users are able to access their organizationís network and 26% are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 22% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 5%.
  • Around nine in ten respondentsí organizations (94%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (36%).

USA Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 96%
  • 93%
  • 90%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 72%
  • 72%
  • 62%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 73%
  • 55%
  • 59%
  • 78% of organizations have increased investment in perimeter security over the past 5 years, with only the minority (5%) seeing a decrease in investment.
  • On average, almost 9% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and the same percentage is spent on data protection.
  • The majority of respondents (71%) think their organization invests enough in security and 87% think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, 46% would allocate the most spend to data security while 31% would allocate the most to perimeter security.

USA Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (73%), resources (55%) and time (59%) being spent on protecting customer data rather than protecting their organizationís intellectual property, 18% admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • Only 5% of IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around half of respondents (53%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over eight in ten (84%) organizations to adjust their security strategy.

UK Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 20%
  • 20%
  • 20%
  • 20%
  • 18%
  • 15%
  • 13%
  • 10%
  • 8%
  • 5%
  • 3%

What was the source of your most recent breach?

  • 53%
  • 13%
  • 10%
  • 10%
  • 3%
  • 0%
  • 20%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 18%
  • 28%
  • 10%
  • 15%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (92%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, 14% think unauthorized users are able to access their organizationís network and more than half (52%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past eighteen months, 29% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 15%. The most common forms of respondentsí organizationís perimeter security system breaches are viruses (86%) and malware (75%).
  • More than half of respondentsí organizations (56%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a decrease in employee productivity and confidence (28%).

UK Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 94%
  • 83%
  • 71%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 59%
  • 49%
  • 44%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 82%
  • 74%
  • 69%
  • Nearly two thirds (65%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (6%) seeing a decrease in investment.
  • On average, 9% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (8%) is spent on data protection.
  • The majority of respondents (67%) think their organization invests enough in security and 79% think their organization invests in the right technologies. Were the respondents to be in charge of their organizationís security budget, 41% would allocate the most spend to data security while the same percentage would allocate the most to perimeter security.

UK Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (82%), resources (74%) and time (69%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (29%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • 14% of IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • The majority of respondents (81%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven more than half (51%) organizations to adjust their security strategy.

France Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 21%
  • 19%
  • 18%
  • 15%
  • 15%
  • 13%
  • 10%
  • 8%
  • 8%
  • 7%
  • 4%

What was the source of your most recent breach?

  • 68%
  • 26%
  • 24%
  • 24%
  • 8%
  • 0%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 36%
  • 31%
  • 22%
  • 32%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (87%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, more than a third (36%) think unauthorized users are able to access their organizationís network and over half (51%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 30% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 9%. The most common forms of respondentsí organizationís perimeter security system breaches are viruses (83%) and malware (76%).
  • Almost nine in ten respondentsí organizations (89%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (36%).

France Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 92%
  • 89%
  • 73%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 64%
  • 57%
  • 65%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 77%
  • 48%
  • 64%
  • Over three quarters (77%) of organizations have increased investment in perimeter security over the past 5 years, with only a very small number (2%) seeing a decrease in investment.
  • On average, 8% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (8%) is spent on data protection.
  • The majority of respondents (69%) think their organization invests enough in security and five in six (84%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, more than half (52%) would allocate the most spend to data security while 31% would allocate the most to perimeter security.

France Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (23%), resources (52%) and time (36%) being spent on protecting customer data rather than protecting their organizationís intellectual property, more than a quarter of respondents (28%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • 14% of IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around three out of five respondents (67%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over eight in ten (82%) organizations to adjust their security strategy.

Germany Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 27%
  • 25%
  • 23%
  • 17%
  • 15%
  • 13%
  • 12%
  • 12%
  • 12%
  • 12%
  • 12%

What was the source of your most recent breach?

  • 52%
  • 21%
  • 27%
  • 31%
  • 8%
  • 0%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 31%
  • 23%
  • 25%
  • 21%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (93%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, a third (24%) think unauthorized users are able to access their organizationís network and 41% are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 23% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 9%. The most common forms of respondentsí organizationís perimeter security system breaches are viruses (82%) and malware (84%).
  • Nine in ten respondentsí organizations (79%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (31%).

Germany Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 90%
  • 89%
  • 72%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 63%
  • 57%
  • 57%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 67%
  • 54%
  • 59%
  • Close to three quarters (73%) of organizations have increased investment in perimeter security over the past 5 years, with (7%) seeing a decrease in investment.
  • On average, almost 9% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (8%) is spent on data protection.
  • The majority of respondents (82%) think their organization invests enough in security and 96% think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, more than half (54%) would allocate the most spend to data security while a third (26%) would allocate the most to perimeter security.

Germany Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (67%), resources (54%) and time (59%) being spent on protecting customer data rather than protecting their organizationís intellectual property, 17% of respondents admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • 11% of IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around three out of five respondents (62%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (71%) organizations to adjust their security strategy.

Benelux Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 18%
  • 18%
  • 18%
  • 18%
  • 12%
  • 12%
  • 12%
  • 6%
  • 6%
  • 6%
  • 6%

What was the source of your most recent breach?

  • 35%
  • 41%
  • 41%
  • 35%
  • 0%
  • 6%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 29%
  • 35%
  • 24%
  • 29%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (88%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, a third (26%) think unauthorized users are able to access their organizationís network and the same number (26%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 12% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 6%. The most common forms of respondentsí organizationís perimeter security system breaches are viruses (42%) and malware (72%).
  • Nearly nine in ten respondentsí organizations (88%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is decreased employee productivity and confidence (35%).

Benelux Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 75%
  • 76%
  • 79%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 47%
  • 47%
  • 60%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 60%
  • 60%
  • 52%
  • 70% of organizations have increased investment in perimeter security over the past 5 years, with 20% seeing a decrease in investment.
  • On average, almost 8% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (7%) is spent on data protection.
  • The majority of respondents (70%) think their organization invests enough in security and five in six (82%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, 38% would allocate the most spend to data security while a third 30% would allocate the most to perimeter security.

Benelux Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (60%), resources (60%) and time (52%) being spent on protecting customer data rather than protecting their organizationís intellectual property, 18% admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • More than one in every six (18%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • More than three quarters (78%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (60%) organizations to adjust their security strategy.

Poland Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 52%
  • 31%
  • 22%
  • 21%
  • 21%
  • 19%
  • 17%
  • 15%
  • 14%
  • 12%
  • 5%

What was the source of your most recent breach?

  • 27%
  • 76%
  • 66%
  • 14%
  • 29%
  • 0%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 31%
  • 31%
  • 36%
  • 27%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (90%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, over three quarters (76%) think unauthorized users are able to access their organizationís network and (18%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 73% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 4%.
  • Nine in ten respondentsí organizations (98%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is decreased customer confidence (36%).

Poland Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 85%
  • 27%
  • 70%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 71%
  • 51%
  • 38%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 85%
  • 33%
  • 77%
  • Over three quarters (77%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (14%) seeing a decrease in investment.
  • On average, almost 8% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and the same percentage is spent on data protection.
  • The majority of respondents (91%) think their organization invests enough in security and five in six (86%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, nearly half (69%) would allocate the most spend to data security while a third (23%) would allocate the most to perimeter security.

Poland Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (85%), resources (33%) and time (77%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (18%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • 11% IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around a third of respondents (32%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over eight in ten (82%) organizationís to adjust their security strategy.

Czech Republic - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 42%
  • 32%
  • 30%
  • 26%
  • 26%
  • 22%
  • 14%
  • 12%
  • 10%
  • 8%
  • 0%

What was the source of your most recent breach?

  • 6%
  • 46%
  • 30%
  • 26%
  • 4%
  • 0%
  • 2%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 16%
  • 40%
  • 24%
  • 26%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (66%) of organizations donít think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, half (50%) think unauthorized users are able to access their organizationís network and a similar number (54%) are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 76% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was 16%.
  • Eight in ten respondentsí organizations (80%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a decrease in employee productivity and confidence (40%).

Czech Republic - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 96%
  • 46%
  • 71%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 46%
  • 46%
  • 30%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 64%
  • 54%
  • 46%
  • Close to two thirds (62%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (16%) seeing a decrease in investment.
  • On average, 13% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a 10% is spent on data protection.
  • The majority of respondents (66%) donít think their organization invests enough in security and over a third (34%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, 20% would allocate the most spend to data security while 40% would allocate the most to perimeter security.

Czech Republic - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (64%), resources (54%) and time (46%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost two thirds (63%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • Almost two thirds (62%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • More than eight in ten respondents (84%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (48%) organizations to adjust their security strategy.

Middle East Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 29%
  • 29%
  • 29%
  • 29%
  • 14%
  • 14%
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%

What was the source of your most recent breach?

  • 71%
  • 57%
  • 29%
  • 14%
  • 14%
  • 0%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 29%
  • 43%
  • 43%
  • 0%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (80%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, just over a quarter (26%) think unauthorized users are able to access their organizationís network and 20% are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 6% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was as low as 2%.
  • Seven in ten respondentsí organizations (72%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a loss of customers (57%).

Middle East Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 91%
  • 84%
  • 36%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 45%
  • 39%
  • 40%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 66%
  • 54%
  • 42%
  • Nearly two thrids (64%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (6%) seeing a decrease in investment.
  • On average, almost 7% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and a similar amount (6%) is spent on data protection.
  • The majority of respondents (78%) think their organization invests enough in security and five in six (82%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, over half (52%) would allocate the most spend to data security while over a third (36%) would allocate the most to perimeter security.

Middle East Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (66%), resources (54%) and time (46%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (34%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • One in every five (20%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • The majority of respondents (94%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (52%) organizations to adjust their security strategy.

Hong Kong Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 27%
  • 27%
  • 21%
  • 21%
  • 18%
  • 18%
  • 18%
  • 18%
  • 12%
  • 9%
  • 9%

What was the source of your most recent breach?

  • 61%
  • 27%
  • 24%
  • 21%
  • 21%
  • 0%
  • 9%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 42%
  • 33%
  • 39%
  • 21%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (90%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, over a third (34%) think unauthorized users are able to access their organizationís network and 22% are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 38% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 7%.
  • Nine in ten respondentsí organizations (75%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (42%).

Hong Kong Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 83%
  • 78%
  • 70%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 64%
  • 58%
  • 45%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 86%
  • 68%
  • 54%
  • Close to three quarters (72%) of organizations have increased investment in perimeter security over the past 5 years, with only the minority (10%) seeing a decrease in investment.
  • On average, 7% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and the same percentage is spent on data protection.
  • The majority of respondents (84%) think their organization invests enough in security and 92% think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, nearly half (48%) would allocate the most spend to data security while a third (34%) would allocate the most to perimeter security.

Hong Kong Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (86%), resources (68%) and time (54%) being spent on protecting customer data rather than protecting their organizationís intellectual property, 14% admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • 12% of IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Three out of five respondents (60%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven over seven in ten (76%) organizationís to adjust their security strategy.

Japan Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 33%
  • 33%
  • 25%
  • 17%
  • 17%
  • 17%
  • 17%
  • 17%
  • 8%
  • 0%
  • 0%

What was the source of your most recent breach?

  • 75%
  • 58%
  • 8%
  • 17%
  • 0%
  • 0%
  • 0%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 17%
  • 17%
  • 58%
  • 33%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (88%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, 22% think unauthorized users are able to access their organizationís network and 38% are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 12% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was below 5%.
  • Over nine in ten respondentsí organizations (92%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is decreased customer confidence (58%).

Japan Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 96%
  • 80%
  • 67%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 80%
  • 71%
  • 67%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 88%
  • 74%
  • 82%
  • Close to two thirds (64%) of organizations have increased investment in perimeter security over the past 5 years, with a small number (2%) seeing a decrease in investment.
  • On average, almost 7% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and 9% is spent on data protection.
  • The majority of respondents (68%) think their organization invests enough in security and over three quarters (76%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, 30% would allocate the most spend to data security while a 20% would allocate the most to perimeter security.

Japan Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (88%), resources (74%) and time (82%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (24%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • Almost one in every six (14%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around three out of five respondents (74%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven six in ten (60%) organizations to adjust their security strategy.

Australia Results - The Reality: Organizationsí Breaches

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Has your organisation's perimeter security system been breached in the past twelve months?

Type of perimeter security system breaches in the past twelve months?

  • 24%
  • 21%
  • 21%
  • 14%
  • 14%
  • 14%
  • 10%
  • 10%
  • 10%
  • 7%
  • 3%

What was the source of your most recent breach?

  • 66%
  • 14%
  • 34%
  • 17%
  • 14%
  • 0%
  • 7%

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 34%
  • 28%
  • 24%
  • 28%

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

  • The majority (88%) of organizations think their perimeter security systems are effective at keeping unauthorized users out of their network. Despite this, 28% think unauthorized users are able to access their organizationís network and a the same number are not confident that their organizationís data would be secure if unauthorized users penetrated their network perimeter.
  • In the past twelve months, 20% of all respondentsí organizations experienced a perimeter security system breach.
  • And of the most recent experience, the average amount of breached data protected by encryption was 10%.
  • Almost nine in ten respondentsí organizations (86%) whose perimeter security systems experienced a breach suffered negative commercial consequences of the breach. The most common consequence is a delay in product/service development (34%).

Australia Results - Perimeter Security Investment

Select a question

Over the past five years, how has your investment in perimeter security technology changed?

Which perimeter security technologies have seen an increase in their investment over the past five years?

  • 79%
  • 88%
  • 77%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

Over the next 12 months, which perimeter security technologies will have their investment increased?

  • 58%
  • 63%
  • 59%



Perimeter security - IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Data security - Encryption, fraud detection and/or key management.

Identity & access control - User-authentication.

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and†managed services)?

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Which of these would worry you more?

Is there more emphasis on protecting customer data (e.g. medical, financial information, personal identifiable information) or protecting your organisation's intellectual property (e.g. embedded devices such as vehicle software, automated machinery etc.)?

Protecting Customer Data

  • 68%
  • 48%
  • 50%
  • Over three quarters (76%) of organizations have increased investment in perimeter security over the past 5 years, with only (12%) seeing a decrease in investment.
  • On average, almost 8% of the security budgets in surveyed organizations are spent on purchasing, deploying and maintaining perimeter security systems and the same percentage is spent on data protection.
  • The majority of respondents (82%) think their organization invests enough in security and five in six (82%) think their organization invests in the right technologies. Were the respondent to be in charge of their organizationís security budget, half (50%) would allocate the most spend to data security while a third (28%) would allocate the most to perimeter security.

Australia Results - Protecting Customer Data

Select a question

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Do you feel that your organisation has the security capabilities necessary to keep up with these emerging threats and technologies?

  • Despite more budget (68%), resources (48%) and time (50%) being spent on protecting customer data rather than protecting their organizationís intellectual property, almost a quarter of respondents (20%) admit they do not feel their organization has the security capabilities necessary to keep up with emerging threats and technologies.
  • One in five six (20%) IT decision makers surveyed would not trust their own organization to manage and store their personal data.
  • Around three out of five respondents (74%) are no more confident than they were this time last year in the security industry's ability to detect and defend against emerging security threats.
  • High-profile data breaches have driven almost three quarters (74%) of organizations to adjust their security strategy.