The majority of Global 2000 companies have areas within their networks that are not properly analyzed, and these "blind spots" can lead to costly breaches because of unknown applications, traffic, devices and users operating insecurely on a corporate network, according to a new report from Frost & Sullivan.

The study, sponsored by security provider ForeScout Technologies, found that 72 percent of the 400 IT and security professionals surveyed worldwide reported that they experienced five or more network-based security incidents in the past 12 months.

When asked where network blind spots exist, 44 percent of respondents said firewalls were the biggest issue; 40 percent cited vulnerability assessment; and 40 percent said advanced threat detection.

Network intrusion prevention, security information and event management (SIEM), enterprise mobility management; and antivirus, patch and configuration management were mentioned by respondents as well.

"We've confirmed what most people already expect—that no company is truly secure without its security technologies working together,” Chris Kissel, industry analyst, Network Security Research at Frost & Sullivan, said.

“A siloed security approach can create network blind spots that have costly, long-term impacts on business continuity and brand reputation," Kissel said. "Without full network visibility, these attack surfaces will only increase, given the fast-growing number of BYOD [bring your own device] and IoT [Internet of Things] devices being connected to corporate networks."

Managed devices experienced the most security incidents, despite increased investment in managed security technologies. Managed end-user computers yielded the highest network-based security incidents, with nearly one-third of companies in the U.S., 19 percent in the U.K. and 50 percent in Germany reporting five or more.

Managed servers also served as gateways for attack in 27 percent of companies in the U.S., 19 percent in the U.K. and 36 percent in Germany. The survey suggested that this is leading to low customer confidence in security agents being deployed.

Register or login for access to this item and much more

All Health Data Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access