Cynet today announced the State of Breach Protection 2020 Report. The report reveals significant concerns that security decision-makers need to look into immediately while designing their Breach Protection Plans for 2020. Cybersecurity is one of the major concerns stated in this report. It reveals that a large number of organizations are seriously charting out their advanced protection projects in 2020 on a priority basis. Most of those enterprises are trying to find out proactive protection solutions. The complete report can be accessed here: https://www.cynet.com/resources/?tax=surveys.

The source of the State of Breach Protection 2020 Report includes 1,536 cybersecurity professionals who participated in a poll in December 2019. The purpose of this poll was to understand their course of action to protect their organizations against breaches. It is, in fact, important to understand every organization's set of common practices, prioritizations, and preferences in that regard. The results of the poll very clearly indicated most of the security professionals from these organizations were seriously looking for a strong and advanced solution to deploy and protect their organizations against any kind of breach that is beyond standard anti-virus, firewall, and email protection systems in place.

The key pointers in the report to be answered by the security professionals included top cyber risks, preferred security products, organizational security stacks, roles of security services within that stack, plans to consolidate the breach protection stacks, IT architecture considerations, and the cloud/on-premise balance. Key findings that emerged in the report, stemming from those security professionals who were surveyed include:

Lack of a Consolidated Cybersecurity Platform: Most of the organizations lack the build-out of a consolidated cybersecurity platform. That becomes a major setback against protection. That also restricts them from gaining a holistic insight on security concerns. Building a multi-product security stack is important. Management's approval for the procurement of additional security products and solutions becomes critical.

Lack of a Centralized Response Orchestration: A centralized response orchestration for IR operations is more important than the automation to their remediation workflows.

Security Outsourcing: Most of the organizations have a reservation in outsourcing security. On one hand, organizations are facing severe security skill gaps that compel them to outsource a substantial chunk of their security operations. On the other hand, the same organizations want to keep things in-house. There is a major conflict going on in this regard.

The baseline is a Must for Every Organization: Firewall, AV, email protection, and vulnerability management are the must-haves for any organization at the enterprise level. This is the baseline for every organization. No cybersecurity professional would deny it.

EDR/ERP the Main Vector forAgainst Advanced Attacks: A very small segment of enterprises are risk-free or attack-free because of EDR/ERP deployments on endpoints. In most cases, it is otherwise.

Eyal Gruner, Founder & CEO of Cynet says, “The underlying theme of this report is the issue of cyber technology consolidation. While the lack of consolidation is a dominant practice, most organizations view it as a core problem that must be solved. Cynet 360 is the world’s first Autonomous Breach Protection Platform that consolidates and automates endpoint, network and user protection across the full security lifecycle: proactive monitoring and control, attack prevention and detection, and response orchestration.”

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)