Confidence in Antivirus Falls to All-time Low; Prevention Viewed as Foundational to Security Architecture
CUPERTINO, Calif. — June 30, 2015 — Bromium®, Inc., the pioneer of threat isolation to prevent data breaches, today announced the results of a new survey, “Enterprise Security Confidence Report.” For the survey, more than 125 information security professionals were asked about the greatest risks facing organizations today and the effectiveness of different solutions and architectures. The results show that while concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is shifting toward prevention-based security solutions, such as endpoint threat isolation.
“The frequency and magnitude of high-profile data breaches is causing organizations to lose faith in detection-based solutions, such as antivirus,” said Clinton Karr, senior security strategist at Bromium. “Information security professionals are turning instead to technologies that provide proactive protection, such as threat isolation, as the foundation of their security architecture.”
Highlights from the “Enterprise Security Confidence Report” include:
- Less Confidence in Legacy Detection Solutions — An overwhelming majority of respondents (92 percent) said they have lost confidence in the ability of traditional endpoint protection solutions, such as antivirus and white listing, to detect unknown threats like zero-day attacks. Additionally, 78 percent believe antivirus is not effective against general cyber attacks.
- Endpoint Threat Isolation is Most Effective — When asked to select from a list of security solutions, information security professionals consider endpoint threat isolation the most effective solution at preventing cyber threats (58 percent). Nearly one-third said network-based solutions are effective; 28 percent have faith in intrusion detection/intrusion prevention (IDS/IPS); and 27 percent think network sandboxes are effective.
- End Users Source of Greatest Risk — Nearly two-thirds of respondents (62 percent) believe that users are one of the greatest sources of security risk. Additionally, more than one-quarter cited emerging cloud and mobile technologies that reduce IT control; 29 percent cited cloud services; and 29 percent said mobile devices among the top sources of risk.
- Prevention is Foundation of Security — A majority of respondents (58 percent) believe that prevention, such as hardening and isolating systems, is the most foundational aspect of security architecture, compared to 23 percent who cited detection, 16 percent who cited response (investigation/remediation), and 34 percent who said predictive analytics.
According to Gartner analysts Neil MacDonald and Peter Firstbrook, in “Designing an Adaptive Security Architecture for Protection From Advanced Attacks,” published February 12, 2014, “Harden and isolate systems: We believe the foundation of any information security protection architecture should start by reducing the surface area of attack by using a combination of techniques. These techniques limit a hacker’s ability to reach systems, find vulnerabilities to target and get malware to execute.”
Bromium micro-virtualization isolates threats, reducing the attack surface to eliminate data breaches. Bromium vSentry™ automatically isolates each vulnerable user task, such as visiting a website, opening a document or accessing a USB drive. Malware entering a micro-VM cannot modify the operating system or gain access to local or enterprise data or network infrastructure. Bromium LAVA™ provides real-time security intelligence without false positives, enabling security teams to quickly analyze and respond to threats.
For more information about Bromium micro-virtualization, please visit: http://www.bromium.com/products.html
About Bromium, Inc.
Bromium is re-inventing enterprise security with its powerful new technology, micro-virtualization, which was designed to protect businesses from advanced malware by design, while simultaneously empowering users and delivering real-time threat intelligence to IT. Unlike traditional security methods, which rely on complex and ineffective detection techniques, Bromium protects against malware from the Web, email or USB devices, by automatically isolating each user task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to any enterprise resource. Bromium’s technological innovations have earned the company numerous industry awards. Bromium counts a rapidly growing set of Fortune 500 companies and government agencies as customers.
Read the Bromium blog: http://blogs.bromium.com/
Follow Bromium on Twitter: https://twitter.com/bromium
Follow Bromium on LinkedIn: https://www.linkedin.com/company/bromium
# # #