Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

  • 9 years ago Posted in

Gemalto has released the latest findings of the 2015 Data Security Confidence Index (DSCI). The report reveals a widening gap emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. The research shows increasing levels of investment in this area of data protection, despite an exponential growth in the number of data breaches.

Investments in Breach Prevention Rise Despite Increased Breaches of Perimeter Security
The number of global data breaches continues to increase - according to Gemalto’s Breach Level Index (BLI), more than 1,500 data breaches led to one billion data records compromised in 2014 alone, a 49% increase in data breaches and a 78% increase in data records stolen or lost compared to 2013. Despite this the DSCI research shows that almost nine out of ten (87%) IT decision makers feel their organisation’s perimeter security systems are effective at keeping out unauthorised users. The study shows that IT decision makers are looking to further increase their investment in perimeter security with 64% looking to do so in the next 12 months. Interestingly, when thinking of the most recent breaches, the average amount of breached data protected by encryption was below 8%, highlighting the need for a more robust data protection strategy.

Low Confidence in Ability to Prevent Breaches and Unauthorised User Access
Nevertheless, a third (33%) believe unauthorised users are still able to access their networks and a further 34% are not confident in the security of their organisation’s data, should a breach occur. In fact, the DSCI survey reveals that as a result of recent high profile breaches, 71% of organisations have adjusted their security strategy, but are still focused on perimeter security. Adding to the confusion, nearly three quarters of IT decision makers (72%) stated that their investment in perimeter security has increased over the past five years, though 30% admitted that in the past 12 months their company has been victim to a breach, showing the need to approach security differently. Although high-profile data breaches have driven over seven in 10 (71%) organisations to adjust their security strategy, more than three in five (62%) respondents are no more confident than they were this time last year in the security industry’s ability to detect and defend against emerging security threats.


“With the number of sophisticated breaches on the rise, relying on perimeter security systems alone is no longer enough. Traditional security staples such as firewalls and anti-virus should be part of a much greater security strategy. IT decision makers need to take into account that if someone is motivated enough they will breach a network, no matter how well it is protected,” said Tsion Gonen, Vice President of Strategy for Identity and Data Protection at Gemalto.

Commercial Impacts of Data Breaches
As a result of these attacks, nine out of 10 organisations (90%) suffered negative commercial consequences, including delays in product or service development (31%), decreased employee productivity (30%), decreased customer confidence (28%), and negative press (24%). This highlights the severe consequences of data breaches, which can be damaging both to an organisation’s reputation and bottom line, as well as to customers’ confidence in entire industry sectors.


“Organisations still place too much emphasis on perimeter security, even though it has proven to be ineffective”, added Gonen. “Decision makers should place greater importance on customer data, and look to adopt a ‘secure the breach’ approach that focuses on securing the data after intruders penetrate the perimeter defenses. This means they need to attach security directly to the data itself using multi-factor authentication and data encryption, as well as securely managing encryption keys. That way, if the data is stolen, it is useless to the thief.”

Singtel among telco partners working with Vultr to provide cloud infrastructure that reduces...
Nerdio releases new features infusing AI capabilities and streamlining management to elevate IT...
Study cites companies’ inability to gain visibility at the architecture level is blowing out...
Next generation product set provides end-to-end, digitally sovereign cloud services.
Cockroach Labs has formed a new partnership with Crayon, a global provider of software and cloud...
Console Connect and Wasabi Technologies to support businesses with fast and secure cloud migration...
West Midlands Trains is owned by Transport UK. Operating London Northwestern Railway and West...
AWS becomes the Official Generative AI Provider of the DFL as part of its long-term innovation...