Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Check Point Software: IT security admin fail to use data encryption

The survey finds businesses struggling to cope with technology mobility

Article comments

New research has found that 70 per cent of IT security administrators currently do not use data encryption to secure business laptops, and 87 per cent of organisations do not encrypt USB or portable media devices.

The findings, of a global survey by Internet security firm Check Point Software, indicate that enterprises are struggling to keep up with the escalating mobile and wireless computing trend.

The trend means that a majority of businesses are potentially vulnerable to unauthorised network access from lost or stolen devices.

The Check Point survey was conducted in September 2010, surveying more than 220 IT security administrators located in the Americas, the Asia Pacific, Europe, and the Middle East.

It found that 64 per cent of organisations are concerned that the growth in remote users will result in exposure to sensitive data.

Mobility way of life

Check Point Software Technologies vice president of endpoint products Ben Khoushy said, in an announcement, that mobile computing and the consumerisation of IT was no longer a trend but a way of life for most businesses.

"Employees and contractors are demanding more access to business applications and data from both corporate and personally-owned devices," said Khoushy.

"Many organisations haven't set up an appropriate plan to secure the use of personal laptops and smartphones in the workplace. These vulnerabilities need to be addressed by a combination of technology and user awareness that enforce better security protections to secure data on-the-go."

Check Point's research also reveals that organisations are using an average of nine different vendors to secure their organisation's infrastructure from the network to the endpoint. This is creating difficulties in security management, particularly for businesses with 500-plus employees.

Check Point says companies combining more than a dozen distinct security solutions are left with large infrastructures, often creating security holes in between point products.

The survey found that IT security administrators are anticipating a significant increase in 2011 in the number of users connecting to their network, with 54 per cent citing specific growth in the number of remote users.

Increasing complexity challenges

The statement said Check Point's research shows that, as organisations continue to grow, IT administrators are increasingly challenged with securing mobile data and complex IT environments - citing data loss, user management, lost or stolen equipment, and employees connecting to untrusted wireless Internet access as top concerns.

In anticipation of continued growth of the mobile workforce, Check Point says 52 per cent of organisations reported they have VPN clients on their portable PCs and intend to deploy disk encryption (23 per cent), encrypted USBs (20 per cent) and data loss protection (17 per cent) in the coming year.

Also, 54 per cent of businesses are planning to migrate to Microsoft Windows 7 within the next two years.

"In effect, businesses are looking to unify endpoint security and make sure new systems are updated with the latest protections," the statement said.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *