New platforms set new demands to IT-security

New platforms set new demands to IT-security.

According to a recent survey conducted by the SANS Institute on more than 100 large companies and 1000 smaller companies in the US and Europe, on how they reason about Information and IT security, the following interesting facts can be read:

About 75 percent of the companies surveyed are more or much more concerned about IT security problems and different types of infringement now than they were a year ago.

Over 70 percent of those surveyed are actively discussing how to protect and control access to data in the cloud or virtual environments, via encryption or various authentication solutions. Mobile device authentication, certificate-based authentication, software authentication, and browser-safe solutions top the list of interest in new authentication solutions.

More than 45 percent of those surveyed indicate that they are interested in these new authentication solutions.

Just over 67 percent of those surveyed have come a long way in their planning to implement new solutions for authentication and data protection in the cloud, in virtual environments or in mobile platforms. This development is largely driven by increased use of these new platforms.

More than half of all respondents say they are looking for or will be looking for new solutions to protect and authenticate data in the cloud, in a virtual environment or in mobile platforms in order to implement this within 9-12 months.

In addition, 95 percent of all respondents believe that, although encryption of data or authentication of access to data is important for the future, these solutions must be supplemented by periodic security and vulnerability analyzes of all internal IT systems to verify that all systems keeps the right level. Parallels are drawn to companies that back up their data but then do not check that these backups can be read back, but only discover this at a sharp position where important data cannot be recovered.

It is important that you do not blindly trust that the security solutions you have are functioning properly without actually verifying this fact. If an intrusion occurs, it is also important to be able to identify which path the attacker used to fix the vulnerability and potentially be able to track the attacker.

The fact that more and more companies are adopting new technologies and new platforms also entails completely new requirements for applications and solutions for managing data security, but also means that new methods and tools for controlling the security of these applications and solutions must be implemented.