16
1 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION # 2016DataThreat Trends in Encryption and Data Security

2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

1 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

2016VORMETRIC DATA THREATREPORT

MEXICO AND BRAZIL EDITION

#2016DataThreat

Trends in Encryption and Data Security

Page 2: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

OUR SPONSORS

TABLE OF CONTENTS

INTRODUCTION 3

OLD SECURITY HABITS DIE HARD 4

THE BIG DISCONNECT 4

KEY FINDINGS 7

ABOUT THIS RESEARCH BRIEF 8

Compliance is NOT security, though Mexico and Brazil differ sharply 8

COMPLEXITY AND SKILL SHORTAGES LOOM LARGER IN BOTH BRAZIL AND MEXICO 9

BRAZIL AND MEXICO MOST WARY OF EXECUTIVE MANAGEMENT 9

CLOUD, BIG-DATA AND IOT PRESENT NEW CHALLENGES 10

Cloud 11

Big Data 12

ioT 12

RECOMMENDATIONS 13

ANALYST PROFILE 15

ABOUT 451 RESEARCH 15

ABOUT VORMETRIC 15

Page 3: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

3 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

“WE ARE SPENDING BILLIONS EACH YEAR ON VARIOUS FORMS OF CYBER-

SECURITY, YET BREACHES CONTINUE TO GROW NEARLY UNCHECKED.”

INTRODUCTION

The past few years have subjected organizations across the globe to a seemingly endless chain of well-publicized data breaches. The latter have elevated concerns about protecting sensitive data beyond the technical realm and into the mainstream public consciousness, and left few individuals confident that organizations are doing enough to ensure the safety of their digitally stored personal information.

3

Hardly a week goes by without news of another damaging data breach incident - according to the Privacy Rights Clearinghouse, the number of records breached in 2015 was more than twice that of 2014 – despite the fact that collectively, we are spending billions each year on various forms of cybersecurity and venture capitalists are spending princely sums on startups touting the latest and greatest new security offerings.

Yet, as we have been painfully reminded in the past twelve months, threats to data no longer come from insiders alone, whether malicious or inadvertent. Indeed, many of the most pernicious attacks we’ve seen in the recent past have come not just from insiders, but from an assortment of external actors – including cybercriminals, nation-states, ‘hacktivists’ and ‘cyber-terrorists’ – that frequently masquerade as insiders by using stolen or compromised credentials to steal all types of valuable data, including Personally Identifiable Information (PII), Personal Health Information (PHI), financial data and intellectual property. Thus as the line between ‘insider’ and ‘outsider’ continues to blur, we have accordingly expanded the scope of the 2016 edition of the Vormetric Data Threat report to encompass all manner of threats to sensitive data, and get a better sense of what the most relevant threats organizations are facing today, how they are addressing those threats, and what we can do better to prepare ourselves against a growing chorus of adversaries.

This special version of the 2016 data threat report is targeted specifically to the Mexican and Brazilian markets, and will address both the similarities to our global report, and also key distinctions with respect to the U.S. and other regions such as Australia, Europe and Japan.

“88% of U.S. financial respondents chose cybercriminals as the number risk to sensitive data.”

Page 4: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 4

OLD SECURITY HABITS DIE HARD

At a high level, our global survey results contained a mix of both good and not-so-good results that showed that in many ways, security professionals are like generals fighting the last war. 451 Research estimates that nearly $40 billion is spent annually on information security products, and the lion’s share of that sum is spent on legacy security technologies like firewalls, anti-virus and intrusion prevention - yet data breaches continue to increase in both frequency and severity. Clearly, there’s still a big disconnect between what we are spending the most of our security budget on and what’s needed to ensure that our sensitive data remains secure.

As an example, results from our 2016 report show that spending intentions reflected a tendency to stick with what has worked – or not worked - in the past, such as network and endpoint security. This held true again in both Mexico and Brazil, where network security was once again the top category for increased spending over the next 12 months (Mexico 52%; Brazil 60%). Network security was also ranked near the top in terms of effectiveness in both regions: 83% of Brazilians and 77% of Mexicans rated network defenses as either ‘very’ or ‘extremely’ effective at protecting sensitive data - the #2 and #1 ranked security categories in each region, respectively.

On the positive side, both Mexico and Brazil showed much more optimism than other regions when it came to data security. While network defenses had a strong showing in both nations, respondents from both Mexico and Brazil ranked data-in-motion defenses (VPNs, SSL, etc.) as the most effective at securing sensitive data – 85% of respondents from both countries identified the latter as being either ‘very’ or ‘extremely’ effective, well ahead of the global average of 75% and the U.S. at 79%. While data-at-rest defenses (disk and file encryption, etc.) took third place for both Mexico (77%) and Brazil (80%), the percentages were higher than any other region and also comfortably ahead of the global average response of 72% and the U.S. at 75%.

Unfortunately their shared optimism towards data security is not yet translating into spending – data-at-rest defenses were ranked at the bottom in terms of spending priorities for the next 12 months in both Mexico (48%) and Brazil (40%). Data-in-motion defenses fared slightly better, though still trailed both network and endpoint security spending plans. It’s also worth noting that the planned spending increases for network security for both Brazil (60%) and Mexico (52%) cited above were comfortably ahead of the global average (48%), while bracketing the U.S. (55%).

“Our global survey results showed that in many ways, security professionals are like generals fighting the last war.”

“Network security was once again the top category for increased spending over the next 12 months for both Mexico and Brazil.”

“BOTH MEXICO AND BRAZIL SHOWED MUCH MORE OPTIMISM THAN OTHER REGIONS REGARDING THE EFFECTIVENESS OF DATA SECURITY, BUT THE RESULTS AREN’T YET TRANSLATING INTO SPENDING.”

Page 5: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 5

Over time, we are hopeful that the security industry overall – and Mexico and Brazil particularly - will come around to the fact that perimeter defenses offer little help defending against multi-stage attacks, and that approaches that have proven to be effective at protecting data after attackers have bypassed perimeter defenses – such as file and application encryption and access controls – will gain more attention.

Figure 1: Rates for selection of defenses as Very or Extremely effective at protecting sensitive data

Figure 2: IT Security spending plans by type of defense

Brazil Mexico U.S.

Data-in-motion

Network

Data-at-rest

Analysis and correlation tools

End point and mobile

Defenses Rated as Very or Extremely Effective at Protecting Sensitive Data

0% 20% 10% 30% 40% 50% 60% 70% 80% 90%

Brazil Mexico U.S.

Network

End point and mobile

Data-in-motion

Analysis and correlation tools

Data-at-rest

IT Security Spending Plans By Type of Defense

0% 20% 10% 30% 40% 50% 60%

Page 6: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

6 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

We also observed several paradoxes within the results from both Mexico and Brazil. For example, 64% in Mexico and 62% in Brazil claim to have been breached at some point in the past, slightly ahead of the 61% global average and well ahead of the U.S. at 57%. Worse yet, only 18% (Brazil) and 22% (Mexico) claim to have neither been breached or failed a compliance audit at any in the past, by far the two lowest responses of any region in our study, and also well below the global average of 33%. Despite this, just 10% of respondents from Mexico and only 15% from Brazil viewed their organizations as either ‘very’ or ‘extremely’ vulnerable to internal and external threats to data, well below the global average of 30%. Only Japan (11%) had a similarly conservative attitude to threats to data.

“Over time, we are hopeful that the security industry will come around to the fact that perimeter defenses offer little help defending against multi-stage attacks.”

Figure 3: Comparative rates of data breach and compliance audit failures

Experienced a data breachat another time in the past

Experienced a databreach in the last year

Failed a compliance audit in the last year

None of the above

Failed a compliance audit at another time in the past

Data Breach and Compliance Audit Failures

0% 20% 10% 30% 40% 50%

Brazil Mexico U.S.

“64% IN MEXICO AND 62% IN BRAZIL CLAIM TO HAVE BEEN BREACHED AT SOME POINT IN THE PAST, YET 10% AND 15%, RESPECTIVELY, VIEWED THEIR ORGANI-ZATIONS AS EITHER ‘VERY’ OR ‘EXTREMELY’ VULNERABLE TO DATA THREATS.”

Page 7: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

7 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

There’s still work to be done

• Data-at-rest defenses were ranked at the bottom in terms of spending priorities for the next 12 months in both Mexico (48%) and Brazil (40%).

• 64% in Mexico and 62% in Brazil experienced a breach at some point in the past, higher than the global average of 61%

• Brazilian (15%) and Mexican (17%) respondents are also among the least likely to see past breaches as a reason to secure sensitive data (vs. 21% global average).

• A full 83% of Brazilian respondents viewed compliance requirements as either ‘very’ or ‘extremely’ effective in preventing data breaches, well ahead of the global average of 64%. To be fair, there are some encouraging takeaways. For example, Brazil was the only region that selected implementing best practices as the number one reason to secure sensitive data (57% vs. 46% in the U.S. and 44% globally). Brazil (74%) and Mexico (65%) also led the way in terms of spending intentions with respect to protecting sensitive data - both countries’ responses were ahead of any other region and also well ahead of both the U.S. (62%) and the global average (59%). And there are increasing signs that respondents in both regions are looking to implement ‘newer’ security tools. Specific categories with the biggest planned increases for data security spending for Brazil include tokenization (54%), application layer encryption (50%), SIEM (45%) and DLP (43%), while the top choices for Mexico include data masking (52%), multi-factor authentication (51%), SIEM (50%) and application layer encryption (48%). In summary, both Brazil and Mexico are doing many of the right things – they just need to do more of them.

KEY FINDINGS:

What we’re doing right

• Brazil (74%) and Mexico (65%) led the way in terms of spending intentions for protecting sensitive data, ahead of any other region and well ahead of the U.S. (62%) and global average (59%).

• Both Mexico (77%) and Brazil (80%) ranked the effectiveness of data-at-rest defenses (disk and file encryption, etc.) higher than any other region and comfortably ahead of the U.S. (75%) and global average (72%).

• Brazil was the only region that selected implementing best practices as the number one reason to secure sensitive data (57% vs. 46% U.S. and 44% globally).

• 50% in Brazil and 48% in Mexico plan to implement application layer encryption (50%)

• The biggest planned spending increase in Brazil (54%) was for tokenization In the following sections we will highlight several key topics with respect to both Brazil and Mexico, and also point out notable instances where latter differed from other segments.

“WE ALSO FOUND IT ENCOURAGING THAT BRAZIL (74%) AND MEXICO (65%) LED THE WAY IN TERMS OF SPENDING INTENTIONS WITH RESPECT TO PROTECTING SENSITIVE DATA, AHEAD OF ANY OTHER REGION AND WELL AHEAD OF THE GLOBAL AVERAGE OF 59%.”

Page 8: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 8

ABOUT THIS RESEARCH BRIEF

The 2016 Vormetric Data Threat Report is based on a survey conducted by 451 Research during October and November of 2015. In this research brief, we’ll highlight the results collected from 101 senior security executives within the U.S. healthcare sector. These results will be compared, where applicable, to findings in other key U.S. verticals such as financial services, healthcare, and retail, as well as those in other countries.

Compliance is NOT security, though Mexico and Brazil differ sharply

Many security executives across the globe still appear to equate compliance with security, and nearly two-thirds (64%) of our global respondents viewed compliance requirements as either ‘very effective’ or ‘extremely effective’ in preventing data breaches, up from 59% last year. However, while compliance can serve as an effective starting point or baseline for any information security program, the steadily growing volume of data breaches should serve as a strong reminder that we need to do more than just check off compliance boxes if we want to make sure our data remains safe.

Yet compliance was one notable area where we see a divergence in attitudes between the two nations. Brazil, for example, had the most sanguine view of compliance of any region, by a wide margin. A full 83% of Brazilian respondents viewed compliance requirements as either ‘very’ or ‘extremely’ effective in preventing data breaches, well ahead of the U.S. at 67% and the global average of 64%.

Yet paradoxically, compliance was ranked just sixth overall in Brazil as a reason for securing sensitive data (26%), well below the U.S. at 54% and the global average of 47%, and trailing other responses such as implementing best practices (57%) and reputation and brand protection (53%). It’s also worth noting that Brazil was the only region that selected implementing best practices as the number one reason to secure sensitive data (57% vs. 46% U.S. and 44% globally).

Mexico, on the other hand, came in at the opposite end of the spectrum – just 57% responded ‘very’ or ‘extremely’ effective, ahead of only Japan at 33%. Yet compliance is still the leading reason for securing sensitive data for Mexican respondents (61%), once again the highest of any vertical and well ahead of the U.S. average of 54%.

Figure 4: Ratings for effectiveness of compliance requirements for preventing data breaches

Effectiveness of Compliance Requirements for Preventing Data Breaches

Very effective

Extremely effective

Somewhat effective

Not at all effective

0% 20% 10% 30% 40% 50% 60% 70%

Brazil Mexico U.S.

Page 9: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 9

COMPLEXITY AND SKILL SHORTAGES LOOM LARGER IN BOTH BRAZIL AND MEXICO

Data security has often been perceived as being difficult to install and maintain, though deployment challenges can vary greatly in terms of the specific type of data security selected, and also where in the IT stack it is deployed, i.e. at the disk level, file level or application layer. Not surprisingly, our results reflected that same perception - ‘complexity’ was identified as the number one barrier to adopting data security more widely for both nations, selected by 50% of respondents from Mexico and 49% from Brazil. Complex deployments also typically require significant staffing requirements, and not surprisingly ‘lack of staff to manage’ came in as the second highest barrier for both regions (46% Brazil; 45% Mexico) – both ahead of the U.S. at 37% and the global average of 38%.

“Complexity and lack of staff were the top two barriers to adopting data security in both Brazil and Mexico.”

Figure 5: Barriers to adoption of data security

Barriers to Adoption of Data Security

Complexity

Lack of staff to manage

Lack of perceived need

Lack of organizational buy-in

Concerns about impacts on performance and business process

Lack of budget

Brazil Mexico U.S. Global

0% 20% 10% 30% 40% 50% 60%

BRAZIL AND MEXICO MOST WARY OF EXECUTIVE MANAGEMENT When it comes to insider risks to sensitive data, the number one global response was privileged user accounts, selected by 58% of respondents. Brazil (54%) and Mexico (58%), however, seem to be more distrustful of senior management than other regions – 45% of global respondents identified executives as the top insider risk. Privileged users fell into second place (53% Mexico; 51% Brazil), while service providers came in third in both regions (45% Brazil; 39% Mexico), a notch above service providers’ fourth-place global ranking. With respect to external threat actors, cyber-criminals held the #1 spot with 72% of healthcare respondents.

Page 10: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 10

CLOUD, BIG-DATA AND IOT PRESENT NEW CHALLENGES Much has been made of the unique security challenges posed by the triumvirate of big-data, cloud computing and IoT. Since the latter take advantage of resources that largely exist outside of traditional enterprise boundaries, legacy security tools and approaches that rely on a hardened perimeter to enforce existing notions of ‘internal’ vs. ‘external’ have limited applicability. At the same time, security concerns repeatedly show up as one of the leading barriers to more broad adoption of these emerging computing models, despite the fact that both Brazil and Mexico have much higher plans to store sensitive data in public cloud than other regions (SaaS: Brazil 71%; Mexico 64%; U.S. 56%; global 53%; IaaS: Brazil 60%; Mexico 61%; U.S. 55%; global 53%; PaaS: Brazil 63%; Mexico 50%; U.S. 51%; global 49%).

Figure 6: Ratings for the most dangerous insiders (selection as a top three risk)

Figure 7: Plans to store sensitive data within emerging technology environments

Brazil Mexico U.S.

Executives

Privileged users accounts

Service providers

Ordinary employees

Other IT accounts

Contractors

Partners with internal access

The Most Dangerous Insiders

0% 20% 10% 30% 40% 50% 60% 70%

Brazil Mexico U.S. Global

SaaS

Big Data

PaaS

IaaS

IoT

Mobile

Plans to Store Sensitive Data WithinEmerging Technology Environments

0% 20% 10% 30% 40% 50% 60% 70% 80%

Page 11: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

11 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

“Maintaining local control over keys is a critical requirement for many compliance mandates, and not surprisingly was the number one factor that would increase healthcare respondents’ willingness to use public cloud was encryption.”

Cloud Brazilian and Mexican responses regarding public cloud services were generally in line with other regions with respect to the top security concerns: breaches at the cloud provider, vulnerabilities from shared infrastructure and abuse by privileged users. For Brazil, 79% were either ‘very’ or ‘extremely’ concerned about vulnerabilities from shared infrastructure, compared to 78% in Mexico, 73% in the U.S. and 66% globally. Breaches at the cloud provider, the number one responses both globally (70%) and in the U.S. (75%), was also identified by 75% of respondents from Brazil, and was the top response in Mexico at 80%.

What are the primary ways to ease cloud adoption concerns among healthcare sector respondents? Like most regions, encryption of sensitive data stored in the cloud was a top choice for both Brazil and Mexico. However, who manages the keys and where they keys are stored is shaping up to be critical issue for the cloud security. Maintaining local control over keys is a critical requirement for many compliance mandates, and not surprisingly was the number one factor that would increase respondents’ willingness to use public cloud , at 49% of responses in the U.S. and 49% globally. The same held true for Mexico, the top response selected by 44% of respondents. While nearly the same percentage of Brazilian respondents (43%) also selected encryption with local key management, the number one response was detailed architectural information (58% vs. 36% globally).

Figure 8: Changes that would increase usage of Cloud environments

Brazil Mexico U.S. Global

Detailed physical and IT Security profile

Encryption with ServiceProvider Key Control

Encryption with Local KeyControl in my Data Center

SLAs and Liability Termsfor a Data Breach

Detailed Exposure ofSecurity Monitoring Data

Service Provider RoleDescriptions and Mapping

Written ComplianceCommitments

Changes that would Increase Usage of Cloud environments

0% 20% 10% 30% 40% 50% 60%

Page 12: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

12 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

Big DataIn terms of plans to store sensitive data in big-data environments, Mexico and Brazil diverged once again. While Brazilian respondents have the highest plans to store sensitive data in Big Data environments (64% vs. 54% U.S. and 50% globally), Mexico has the fewest of all regions (42%) other than Japan (20%). Not surprisingly, only 13% of Mexican respondents view big-data as one of the most risky locations to store sensitive data, ranked tenth overall. However, 21% of Brazilian respondents view big-data as the most risky, in line with the global average of 21% but below the U.S. – the highest response at 24%. Big-data only trails SaaS (71%) as the ‘new’ technology environment that Brazilians plan to store sensitive data in.

With respect to what risks they were most concerned about, the security of big-data reports that may include sensitive data were the top big-data security concerns for both Brazil (57%) and Mexico (58%), well ahead of the U.S. and global average, both at 42%. Given the heightened global concerns about data sovereignty, the number two concern for both nations was not surprisingly privacy issues related to data originating in multiple countries (44% Brazil; 50% Mexico; 39% U.S.; 40% global).

IoT Though the Internet of Things (IoT) promises to present a security hurdle of epic proportions, security concerns also reflect IoT’s early stage of adoption, and this was true across both our global results and within the healthcare sector. That said, IoT promises to loom large within both Brazil and Mexico; both nations demonstrated a higher degree of concern for IoT security than other sectors. Brazil, for example, has among the highest plans to store sensitive data in IoT environments (41%), while Mexico (35%) is slightly ahead of the U.S. at 34% and global average of 33%. However, when it comes to the most risky locations for storing sensitive data, the two nations once again have widely differing views. While IoT devices were ranked eighth globally (18%) and the U.S. (16%) and ninth in Mexico (14%), Brazilian respondents viewed IoT devices as the third-riskiest location (27%).

Given the sheer volume of connected devices that are expected to be deployed in the coming years, securing sensitive data generated by IoT devices is not surprisingly a primary global concern of most security professionals (35% globally, 36% U.S.), and this certainly held true for both Brazil (40%) and Mexico (41%). Brazil and Mexico also demonstrated greater concerns for privileged access to IoT devices (32% respectively vs. 28% globally and in the U.S.), and loss or theft of IoT devices than the rest-of-world (35% Mexico; 32% Brazil, 25% global; 23% U.S.).

“Brazil and Mexico also diverge sharply when it comes to big-data. While Brazil has the highest percentage of respondents planning to store sensitive data in big-data environments, Mexico is the second-lowest.”

Page 13: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

13 2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY

Brazil Mexico U.S. Global

Protecting sensitive data generated by IoT

Identifying which datais sensitive

Privileged user access to IoT devices

Loss or theft of IoT devices

Attacks on IoT devices may impact critical operations

Privacy violations

Lack of industry standards

Lack of security frameworks and controls

Lack of effective access controls and authentication

Lack of skilled personal to implement IoT securely

Biggest IoT Security Concerns

0% 20% 10% 30% 40% 50%

Figure 9: Biggest IoT security concerns

RECOMMENDATIONS

The past few years have been challenging ones for the information security industry as a whole, and nearly everyone has been affected – end users, enterprises and security vendors alike. If we have learned anything in that time, it is that our old ways of doing business and securing our resources are no longer working as they once did. For many organizations, Albert Einstein’s oft-used quote is fitting – if doing the same thing over and over and expecting a different result isn’t the definition of insanity, it is certainly a recipe for placing your critical assets at risk.

So where do we go from here? Like most regions and verticals, healthcare organizations must recognize that doing more of the same won’t help us achieve an improved security posture. As an industry, we need to pay more attention to new techniques for preventing attacks as well as detecting potential threats more rapidly and narrowing the window of exposure.

Page 14: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

“FOR MANY ORGANIZATIONS, ALBERT EINSTEIN’S OFT-USED QUOTE IS FITTING – IF DOING THE SAME THING OVER AND OVER AND EXPECTING A DIFFERENT RESULT ISN’T THE DEFINITION OF INSANITY, IT IS CERTAINLY A RECIPE FOR PLACING YOUR CRITICAL ASSETS AT RISK.”

14

As firms grow to accept the limitations of traditional security approaches, data security is likely to become a critical component of any comprehensive security strategy. Organizations of all sizes and in all regions need to consider things like data discovery and classification, DLP and encryption, particularly as cloud, big-data and IoT create greater volumes of sensitive data distributed across an exponentially larger array of devices.

But as we have discussed, data security is not without its own challenges. More liberal use of encryption and other data security techniques also raises the potential for introducing an array of single-function products that are needed to address an increasingly diverse set of use cases, which in turn can increase overall complexity and staffing requirements. Given the top two data security hurdles for both Brazil and Mexico – namely, complexity and lack of staff - the message for enterprises and data security vendors is clear. In order to achieve broader adoption of data security products, the latter must be more cost effective, simpler to use and require less manpower to deploy, operate and maintain on an ongoing basis.

Brazilian and Mexican organizations alike should thus consider vendors with a broad range of data security options to help reduce both the upfront acquisition cost as well as ongoing operational costs that have traditionally been associated with data security. We have also seen the emergence of service-based offerings for a variety of data security tools such as DLP, encryption key management and digital certificate management, to name a few, and we anticipate more service-based data security offerings to emerge in coming years.

Lastly, we suggest customers explore, in addition to encryption, new security analytics techniques can offer an extra layer of protection above and beyond what encryption alone can provide. For example, 451 Research is following new developments in threat analytics and techniques to monitor data access patterns to establish baselines of ‘normal’ activity that can be used to identify potential breaches and provide a greater degree of visibility into potentially compromised resources.

Discover andclassify

Encryption andaccess control

Data security platforms

Services-based delivery

Get a better handle on location of sensitive data, particularlyfor early IoT adopters like Brazil and Mexico

Data center: Consider an ‘encrypt everything’ strategy Cloud: encrypt and manage keysBig Data: employ discovery as a complement to encryptionIoT: consider device authentication and encryption, as well asencryption in transit

Use platform solutions to avoid a tangle of point productsand keep costs down

Look for services – based offerings or partnership programsto reduce complexity and staffing requirements

Page 15: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

2016 VORMETRIC DATA THREAT REPORT MEXICO AND BRAZIL EDITION • TRENDS IN ENCRYPTION AND DATA SECURITY 15

ANALYST PROFILE

Garrett Bekker is a Senior Analyst in the Information Security Practice at 451 Research. He brings a unique and diverse background, having viewed enterprise security from a variety of perspectives over the past 15 years. Garrett spent more than 10 years as an equity research analyst at several investment banking firms, including Merrill Lynch, where he was the lead enterprise security analyst, as an investment banker, and also in sales and marketing roles with early-stage enterprise security vendors. Throughout his career, Garrett has focused on a wide variety of subsectors within enterprise security and is now focusing primarily on identity and access management (IAM) and data security, with a special interest in applying the former to cloud-based resources.

ABOUT 451 RESEARCH

451 Research is a preeminent information technology research and advisory company. With a core focus on technology innovation and market disruption, we provide essential insight for leaders of the digital economy. More than 100 analysts and consultants deliver that insight via syndicated research, advisory services and live events to over 1,000 client organizations in North America, Europe and around the world. Founded in 2000 and headquartered in New York, 451 Research is a division of The 451 Group.

ABOUT VORMETRIC

Vormetric’s comprehensive high-performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database and application in any server environment. Advanced transparent encryption, powerful access controls and centralized key management let organizations encrypt everything efficiently, with minimal disruption. Regardless of content, database or application—whether physical, virtual or in the cloud—Vormetric Data Security enables confidence, speed and trust by encrypting the data that builds business.

Please visit www.vormetric.com and find us on Twitter @Vormetric.

Garrett Bekker Senior Analyst 451 Research

Page 16: 2016 VORMETRIC DATA THREAT REPORTgo.thalesesecurity.com/rs/480-LWA-970/images/... · CLOUD, BIG-DATA AND IOT PRESENT . NEW CHALLENGES 10. Cloud 11 Big Data 12 ioT 12. RECOMMENDATIONS

©2016 Vormetric, Inc. All rights reserved.

Vormetric.com/DataThreat/2016