Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

Study Says Business Initiatives Curbed by Security

March 8, 2016

A new Dell report found that though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without detracting from other business initiatives.

Even with tools in place to address data security needs, business and IT decision makers report gaps in their comfort level with implementing or expanding programs that rely on these technologies. In addition, the survey found that security concerns are limiting the adoption of cloud and mobility solutions throughout organizations.

Data security has become a priority for C-suite executives, keeping ahead of the threats remains a concern

While the C-suite is more invested in data security than in the past, IT teams feel executives are still not allocating the energy or resources needed to properly address data security challenges.

• Nearly three in four decision makers agree that data security is a priority for their organization’s C-suite; however, one in four decision makers don’t find their C-suite to be adequately informed about data security issues.
• Three in four decision makers say their C-suite plans to increase current security measures, and more than half expect to spend more money on data security in the next five years.
• Cost is a concern when it comes to building on existing programs, with 53 percent of respondents citing cost constraints for why they don’t anticipate adding additional security features in the future.
• Only one in four decision makers are very confident in their C-suite’s ability to budget enough for data security solutions over the next five years.

“These findings suggest that the C-level has to be more engaged when it comes to integrating data security strategies into their business,” said Steve Lalla, vice president of Commercial Client Software & Solutions for Dell. “Business leaders understand the need to invest in their security infrastructure, but that isn’t translating into updating or expanding their current systems to adequately prevent modern attacks.”

Despite increased buy-in from the C-suite, IT departments still need more business support to fully integrate data security

The report found that a lack of investment in streamlined technologies and a shortage of talent are both barriers to fine-tuning data security programs.
• The majority of decision makers (58 percent) believe that their organization is adversely affected by the shortage of trained security professionals in the industry.
• 69 percent of decision makers still view data security as a burden on their time and budget.
• Still, nearly half (49 percent) of respondents believe they need to spend more time securing their data in the next five years than they are today.
• 76 percent believe their solutions would be less burdensome if provided through a single vendor.

“These findings show that the costs and time constraints that commonly accompany traditional single point solutions have an adverse impact on IT departments,” said Lalla. “For companies with hundreds or thousands of employees, managing each endpoint separately using multiple consoles is extremely inefficient and leads to a high probability of conflict or incompatibility. Implementing a single, integrated suite for IT management can drastically improve this process.”

Malware and weaponized attacks are keeping IT and business decision makers up at night

The report showed that respondents remain highly concerned about malware, despite the fact that most have anti-malware solutions in place.
• Nearly three in four (73 percent) decision makers are somewhat to very concerned about malware and advanced persistent threats.
• Concern over malware threats is highest in the United States (31 percent very concerned), France (31 percent very concerned) and especially India (56 percent very concerned) – while it’s a lesser concern in Germany (11 percent very concerned) and Japan (12 percent very concerned).
• Only one in five respondents are very confident in their ability to protect against sophisticated malware attacks.
• Respondents are more worried about spear phishing attacks (73 percent are concerned) than any other breach method.

“The fact that IT and business decision makers are not confident in their anti-malware defense implies that they may be using outdated or ineffective tools,” said Brett Hansen, executive director, Data Security Solutions for Dell. “When IT teams do not have the resources they need to proactively prevent threats and stay on top of the evolving threat landscape, they are forced to play defense using threat detection and remediation alone.”

Employers feel they have to limit mobility in order to protect data

The common narrative is that all offices are becoming more mobile, but according to this report, the truth is somewhat more complicated.
• The majority of mid-market companies (65 percent) are holding back plans to make their workforce more mobile for security reasons with 67 percent hesitant to introduce a bring-your-own-device (BYOD) program.
• While 82 percent of decision makers have attempted to limit data access points to enhance security, 72 percent of decision makers believe that knowing where data is accessed will make their data protection measures more effective.
• 69 percent of respondents say they are still willing to sacrifice individual devices to protect their company against a data breach, yet 57 percent of respondents are still concerned about the quality of encryption used by their company.
• Security concerns aside, two in five respondents are interested in allowing greater mobility for enhanced employee productivity.

“When organizations opt out of creating sanctioned, secure mobility programs, they open themselves up to other risks,” said Hansen. “Mobility and security can easily co-exist with modern data security technology that uses intelligent encryption to protect data whether it’s at rest, in motion or in use.”

Respondents see their data at risk in public cloud platforms

With more employees using public cloud services like Box and Google Drive in the workplace, decision makers are not confident in their ability to control risks posed by these applications.
• Nearly four in five respondents are concerned with uploading critical data to the cloud, and 58 percent are actually more concerned than they were a year ago.
• 38 percent of decision makers have restricted access to public cloud sites within their organization due to security concerns.
• 57 percent of decision makers who are current cloud users, and 45 percent of those planning to use public cloud platforms, will rely heavily on cloud vendors to provide security.
• Only one in three organizations cite improving secure access to public cloud environments as a key focus for their security infrastructure, yet 83 percent say that employees are either using, or will soon be using, public cloud environments to share and store valuable data.

“Security programs must enable employees to be both secure and productive, and this means enabling technology that helps them do their jobs,” said Hansen. “Companies can try to limit or prohibit public cloud use, but it’s more effective to use intelligent data encryption to protect corporate data wherever it may go, and reduce the risk of employees working around restrictive policies in order to be productive.”

The full report is at http://futurereadyworkforce.dell.com/dell-data-security-survey/ 

KEYWORDS: cloud security cyber security data breach data security malware phishing attack threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Study Says Britons Being Watched by 1.85 Million Security Cameras

    See More
  • IBM Study Says Cloud Computing to Rewrite Corporate Business Models

    See More
  • Cyber Incident Recovery

    BSIMM11 study shows fundamental shifts in software security initiatives in response to DevOps & digital transformation

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing