Global Key Findings

New research reveals many IT decision makers have a “reality distortion field” when it comes to the effectiveness of perimeter security.

Despite the increasing number of data breaches and more than
3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter security technologies are effective against data breaches.

This is one of the many findings of Gemalto’s third-annual Data Security Confidence Index. Other key findings include:

  • 69% of IT professionals are not exteremly confident their data would be secure if perimeter defenses were breached
  • 66% of IT professionals say unauthorized users can access their networks and 16% believe unauthorized users have access to their entire networks
  • One-third of organizations have experienced a data breach in past 12 months
s

Global Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

  • IT decision makers worry more about security breaches such as losing customer/employee data (85%) than being fined for failing a compliance audit (15%).
  • The majority of respondents’ organisations are more likely to allocate more budget (76%), more time (63%), and more resources (57%) to protecting customer data rather than their organisation’s intellectual property.
  • Despite this, less than four in ten (37%) strongly agree that they are 100% confident that they know where their organisation stores personal identifiable information (PII) of customers.
  • Respondent are more likely to know where their organisation’s IP (41%) and financial/and or sales information (42%) is kept.
  • More than one in ten (11%) respondents would not trust their organisation to store and manage their personal data, if they were a customer.

Global Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 82%
  • 81%
  • 66%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

  • For more than half (55%) of respondents’ organisations, their perimeter security includes both internal (software installed on individual computers) and external (perimeter security system that sits between the network and the connecting cable/modem) security solutions.
  • While data security (encryption, fraud detection and/or key management) and perimeter security (IDPS, AV, content filtering, anomaly detection) remain in widespread use (82% and 81% respectively), identity and access control (user-authentication) is now being used by two thirds (66%) of respondents’ organisations.
  • The majority (70%) of respondents have seen investment in perimeter security technology increase in their organisation over the past five years.
  • Investment in perimeter security (86%), data security (78%) and identity and access control (70%) has increased for the majority of those using them. However, investment in identity and access control is far more likely to have stalled and remained the same over the past five years than perimeter security and data security (19% vs. 4% and 6% respectively).
  • Currently, 8.36% of respondents’ organisation’s security budget is spent on purchasing, deploying and maintaining perimeter security technology, on average.
  • Respondents anticipate this being very similar (8.39%) in 12 months’ time. Despite the proportion of budget remaining constant, around two thirds of respondents whose organisation is currently using or planning to use perimeter security (68%) and data security (63%) anticipate that their organisation’s investment in these systems will increase in the next 12 months.
  • For those using or planning to use identity and access control, more than half (54%) are predicting their organisation’s investment to increase in the same time period.
  • More than three quarters (77%) believe that their organisation is investing enough in security (sheet 20). Similarly, most (85%) respondents believe that their organisation is investing in the right technologies. If respondents were in charge of their organisation’s security budget, more than half (51%) would allocate the most spend to data security. Only a third (32%) would spend most on perimeter security and only just over one in ten (12%) would spend most on identity and access control.
  • However, if respondents had to eliminate one method of protecting sensitive data, less than one fifth would choose to eliminate perimeter security (19%) or identity and access control (18%).
  • Close to eight in ten (78%) say that their organisation’s security strategy has been influenced by recent high profile breaches. This has increase from just over seven in ten (71%) in 2015. Also, just over half (51%) are no more confident in the security industry's ability to detect and defend against emerging security threats than they were last year. This number has dropped from 2015, when more than six in ten (62%) had no more confidence than 12 months previously.

Global Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 59%
  • 41%
  • 39%
  • 22%
  • 20%
  • 2%
  • Less than four in ten (37%) respondents believe that their organisation’s perimeter security systems are very effective at keeping unauthorised users out of their network. In addition, two thirds (66%) of respondents believe that unauthorised users can access their organisation’s network, with one in six (16%) claiming that unauthorised users can access the entire network.
  • Maybe given this high level of access, less than a third (31%) are extremely confident that their organisation's data would still be secure if unauthorised users penetrated their network perimeter.
  • The majority (64%) of respondents’ organisations have experienced a breach at some time, with more than a quarter (27%) experiencing a breach in the past 12 months. The most prominent causes of a breach in the past 12 months, experienced by around a fifth of those who have experienced a breach, are malware (21%), RansomWeb (20%) and viruses (20%).
  • Of those respondents whose organisation has experienced a breach, malicious outsiders were the source of the most recent breach for nearly six in ten (59%), while a malicious insider was the source for nearly four in ten (39%). For a similar number (41%) accidental loss was the source.

Global Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 36%
  • 31%
  • 30%
  • 28%
  • 27%
  • 26%
  • 22%
  • 20%
  • 18%
  • 15%
  • 11%
  • 6%
  • 8%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

  • Currently, 8.06% of respondents’ organisation’s security budget is spent on data protection (including encryption and authentication), on average. However, when thinking about their most recent breach, only 7.13% of breached data was protected by encryption, on average.
  • Of the respondents whose organisation have experienced a breach, more than nine in ten (92%) have experienced commercial consequences as a result. Three in ten (30%) experienced negative press, while more than a quarter saw an impact on their bottom line (27%) and experienced decreased customer confidence (26%).
  • On average, the financial cost to respondents' organisations as a result of perimeter security system breaches, suffered in the last five years, is $1,118,806. As a result of breaches experienced, on average respondents are seeing 4.15% of their organisation’s IT budget in the last five years, being spent on detecting and fixing breaches of perimeter security.

USA Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

USA Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 91%
  • 85%
  • 81%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

USA Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 72%
  • 22%
  • 22%
  • 5%
  • 23%
  • 4%

USA Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 30%
  • 38%
  • 19%
  • 26%
  • 23%
  • 32%
  • 19%
  • 19%
  • 11%
  • 13%
  • 8%
  • 8%
  • 12%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

UK Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

UK Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 80%
  • 91%
  • 82%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

UK Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 75%
  • 20%
  • 23%
  • 3%
  • 10%
  • 8%
var ukcdata21 = [['Malicious outsider
', 75], ['Accidental loss
', 20], ['Malicious insider
', 23], ['State sponsored
', 3], ['Hacktivist', 10], ['Don't know', 8]];

UK Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 23%
  • 40%
  • 25%
  • 18%
  • 10%
  • 15%
  • 15%
  • 10%
  • 5%
  • 3%
  • 8%
  • 3%
  • 28%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

France Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

France Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 74%
  • 83%
  • 54%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

France Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 66%
  • 30%
  • 38%
  • 9%
  • 22%
  • 1%

France Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 39%
  • 26%
  • 32%
  • 27%
  • 15%
  • 21%
  • 13%
  • 23%
  • 12%
  • 12%
  • 16%
  • 9%
  • 6%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Germany Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Germany Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 91%
  • 69%
  • 74%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Germany Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 49%
  • 30%
  • 18%
  • 4%
  • 24%
  • 6%
var germanycdata21 = [['Malicious outsider
', 49], ['Accidental loss
', 30], ['Malicious insider
', 18], ['State sponsored
', 4], ['Hacktivist', 24], ['Don't know', 6]];

Germany Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 41%
  • 24%
  • 32%
  • 14%
  • 24%
  • 14%
  • 11%
  • 17%
  • 10%
  • 20%
  • 6%
  • 6%
  • 10%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Russia Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Russia Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 80%
  • 95%
  • 81%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Russia Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 33%
  • 65%
  • 49%
  • 38%
  • 6%
  • 0%

Russia Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 26%
  • 46%
  • 38%
  • 22%
  • 28%
  • 23%
  • 23%
  • 17%
  • 26%
  • 13%
  • 7%
  • 3%
  • 4%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

India Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

India Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 89%
  • 79%
  • 71%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

India Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 71%
  • 49%
  • 40%
  • 25%
  • 36%
  • 1%

India Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 63%
  • 25%
  • 32%
  • 30%
  • 38%
  • 29%
  • 25%
  • 30%
  • 15%
  • 16%
  • 18%
  • 5%
  • 7%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Japan Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Japan Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 85%
  • 72%
  • 43%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Japan Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 62%
  • 59%
  • 50%
  • 54%
  • 25%
  • 0%

Japan Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 41%
  • 35%
  • 32%
  • 34%
  • 47%
  • 31%
  • 38%
  • 25%
  • 35%
  • 31%
  • 22%
  • 3%
  • 1%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Australia Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Australia Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 81%
  • 86%
  • 64%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Australia Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 65%
  • 44%
  • 46%
  • 27%
  • 18%
  • 4%

Australia Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 37%
  • 27%
  • 28%
  • 35%
  • 34%
  • 31%
  • 17%
  • 23%
  • 18%
  • 11%
  • 14%
  • 4%
  • 8%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Brazil Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Brazil Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 86%
  • 72%
  • 60%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Brazil Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 66%
  • 32%
  • 46%
  • 12%
  • 24%
  • 0%

Brazil Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 36%
  • 32%
  • 32%
  • 27%
  • 24%
  • 24%
  • 24%
  • 25%
  • 17%
  • 12%
  • 8%
  • 8%
  • 7%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Benelux Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Benelux Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 82%
  • 81%
  • 66%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Benelux Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

  • 59%
  • 28%
  • 38%
  • 19%
  • 19%
  • 3%

Benelux Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 25%
  • 38%
  • 31%
  • 16%
  • 13%
  • 19%
  • 31%
  • 13%
  • 9%
  • 13%
  • 9%
  • 16%
  • 16%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?

Middle East Results - Protecting the organisation's data

Select a question

Which of these would worry you more?

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More budget is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More resource is assigned to...

Is there more emphasis on protecting customer data or protecting your organisation's intellectual property?
More time is spent on...

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores company IP

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores the company's financial and/or sales information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores customers' financial information

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores personal Identifiable Information (PII) of employees

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation personal Identifiable Information (PII) of customers

To what extent do you agree with the following statement?
I am 100% confident that I know where the organisation stores HR data on employees (e.g. disability data)

If you were a customer of your own organisation, would you trust it to store and manage your personal data (e.g. personal identifiable information, financial information, health records, etc.)?

Middle East Results - Investing in perimeter security

Select a question

Does your organisation use internal (software based) perimeter security systems (firewall, IDPS, AV, content filtering, etc.) or an external (hardware based) solution as part of its IT infrastructure?

Which of the following do you utilise within your organisation?

  • 44%
  • 76%
  • 6%

Over the past five years, how has your investment in perimeter security technology changed?

How has your investment in perimeter security technology changed over the past five years?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

How has your investment in perimeter security technology changed over the past five years?
Data security (encryption, fraud detection and/or key management)

How has your investment in perimeter security technology changed over the past five years?
Identity & access control (user-authentication)

How much of your current security budget are you spending on purchasing, deploying and maintaining perimeter security technology (including next-generation firewalls and managed services)?

How much of your security budget do you plan to spend on perimeter security technology (including next-generation firewalls) in the next 12 months?

Over the next 12 months, how will your investment in perimeter security technology change?
Perimeter security, IDPS, AV, content filtering, Anomaly detection (network monitoring) etc.

Over the next 12 months, how will your investment in perimeter security technology change?
Data security (encryption, fraud detection and/or key management)

Over the next 12 months, how will your investment in perimeter security technology change?
Identity & access control (user-authentication)

Do you think your organisation invests enough in security?

Do you think your organisation's investments in security go to the right technologies?

If you were in charge of your organisation's security budget, which of the following technologies would you allocate the most spend to?

If you had to eliminate just one method for protecting sensitive data, which of these would you get rid of?

Have the high-profile data breaches in the news driven your organisation to adjust its security strategy? (e.g. Sony Pictures and PlayStation, Apple iCloud and Microsoft Xbox)

In the past year, have you become more or less confident about the security industry's ability to detect and defend against emerging security threats?

Middle East Results - Effectiveness of current solutions

Select a question

How effective do you feel perimeter security systems are at keeping unauthorised users out of your network?

Do you think unauthorised users are able to access your network?

Are you confident that your organisation's data would still be secure if unauthorised users penetrated your network perimeter?

Has your organisation's perimeter security system been breached at any time?

Has your organisation's perimeter security system been breached in the past twelve months?

Has your organisation's perimeter security system been breached more than twelve months but less than eighteen months ago?

Has your organisation's perimeter security system been breached more than eighteen months but less than 2 years ago?

Has your organisation's perimeter security system been breached more than 2 years but less than five years ago?

Has your organisation's perimeter security system been breached more than 5 years ago?

Has your organisation's perimeter security system been breached by
RansomWeb (holding websites to ransom by switching their encryption keys)

Has your organisation's perimeter security system been breached by
Malware

Has your organisation's perimeter security system been breached by
Viruses

Has your organisation's perimeter security system been breached by
Trojan horses

Has your organisation's perimeter security system been breached by
SQL injection

Has your organisation's perimeter security system been breached by
Spyware

Has your organisation's perimeter security system been breached by
Botnets

Has your organisation's perimeter security system been breached by
DDoS attacks

Has your organisation's perimeter security system been breached by
Suspected or known AETs (Advanced Evasion Techniques)

Has your organisation's perimeter security system been breached by
Phishing for passwords or access credentials

Has your organisation's perimeter security system been breached by
Data sabotage

What was the source of your most recent breach?

What was the source of your most recent breach?

  • 20%
  • 70%
  • 62%
  • 50%
  • 2%

Middle East Results - Consequences of a security breach

Select a question

How much of your organisation's current security budget are you spending on data protection (including encryption and authentication)?

Thinking about your organisation's most recent breach, what percentage of the breached data was protected by encryption?

Have any of the following been commercial consequences of the breaches your organisation has experienced?

  • 24%
  • 18%
  • 32%
  • 56%
  • 26%
  • 38%
  • 30%
  • 8%
  • 32%
  • 14%
  • 0%
  • 0%
  • 0%

In the last five years, approximately what has been the financial cost to your organisation as a result of your perimeter security system being breached?

What percentage of your organisation's IT budget has gone on detecting and fixing breaches of perimeter security, in the last five years?