Financial sector overconfident when it comes to security

Seventy-one percent believe machine identities are central to company security and viability, but few identities are tracked .

  • 5 years ago Posted in
Venafi has publishd the results of a June 2018 commissioned study titled Securing The Enterprise With Machine Identity Protection. Conducted by Forrester Consulting on behalf of Venafi, the study examined the views of 116 IT security professionals from financial services and insurance organizations in the U.S., U.K., Germany, France and Australia.

 

A key finding from the Venafi study reveals that eighty percent of financial services respondents who are responsible for identity and access management (IAM) believe automated communications between machines on their organizations’ networks are mostly or completely secure. Seventy-one percent of respondents believe effective protection of machine identities is critical to the long-term security and viability of their companies. However, on average, financial services organizations are only tracking forty-three percent of the most common types of machine identities.

 

The study assessed the number of respondents who follow the progress of specific machine identities and found the following:

  • Only fifty-six percent track cloud platform instance machine identities.
  • Just fifty-five percent track physical server machine identities.
  • Less than half (forty-eight percent) track mobile device machine identities.
  • Roughly a third (thirty-four percent) track the machine identities of SSH keys.
  • Only twenty-eight percent track the machine identities of containers.
  • Just twenty-six percent track the machine identities of microservices.

“Financial services organizations have more work to do in order to make sure their machine identities are protected, and  we know these issues are not unique to a specific industry,” said Jeff Hudson, CEO of Venafi. “Despite the importance of machine identities, most organizations are overwhelmed by the sheer number of them on their networks, and they don’t have the visibility, intelligence or automation necessary to take the necessary steps to close the gaping hole in security.”

 

Additional findings from the study include:

  • Forty-one percent say the lack of system administrator focus on machine identity use and protection is a major machine identity protection challenge, and forty-one percent say a major challenge is the lack of automated processes to inventory machine identities.
  • Sixty percent of financial services firms are concerned about internal data theft or loss as a consequence of weak machine identity protection. In addition, fifty-eight percent are concerned about customer data theft or loss.
  • Forty-five percent believe machine identity protection will be a higher priority than human identity protection within the next two years.

Managing user and machine identities, as well as privileged access to business data and applications, is an enormous undertaking that has serious security ramifications. Traditionally, the focus for IAM programs has been people-centric. However, with the recent increase in the number of machines on enterprise networks, shifts in technology, and the latest computing capabilities, a new set of challenges has emerged, requiring an increased focus on the protection of machine identities.

 

From Securing The Enterprise With Machine Identity Protection, Forrester Consulting, June 2018: “Newer technologies, such as cloud and containerization, have expanded the definition of machine to include a wide range of software that emulates physical machines. Furthermore, these technologies are spawning a tidal wave of new, rapidly changing machines on enterprise networks. To effectively manage and protect machine identities, organizations need: complete visibility of all machine identities across their networks; actionable intelligence about each machine identity; and the capabilities to effectively put that intelligence into action at machine speed and at scale.”

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...