Intelligent Data Centres Issue 06 | Page 25
Pulse Secure publishes State of
Enterprise Secure Access report
44%
30%
Data Center + Public Cloud
+ Private Cloud
Data Center + Public Cloud
Data Center + Private Cloud
26%
20%
23%
Utilize all three delivery
environments
Increase in Future Spend
Increase in Future Spend
Most Impactful Access Security Incidents
Malware
55%
Unauthorized/vulnerable endpoint use
ulse Secure, a leading
provider of software-defined
secure access solutions, has
published its 2019 State of
Enterprise Secure Access report that
quantifies threats, gaps and investment
as organisations face increasing hybrid IT
access challenges.
P
The survey of large enterprises in the
US, UK and DACH uncovers business risk
and impact resulting in a pivot towards
extending zero trust capabilities to enable
productivity and stem exposures to
multi-cloud resources, applications and
sensitive data.
61%
45%
Top Control Gaps
DevOps App Delivery Automation
Defining access and protection requisites
Enforcing user and device access policy
IoT device and BYOD access
Dynamic access authentication and protection
Organizations Take Action to Resolve Hybrid IT
Access Security Deficiencies
2019 State of Enterprise
Secure Access
Enabling Application and Data Accessibility
in a World of Multi-Cloud and Zero Trust
Key Enterprise
Priorities
48%
46%
44%
42%
42%
Improve endpoint security,
remediation prior to access
Enhance IoT discovery, isolation
and access control
New report
reveals how
enterprises are
struggling to deal
with Hybrid IT and
Zero Trust access
Fortify network, cloud access visibility
and resource segmentation
Refine privileged user or service
account-based access
Augment app workload delivery
and protection
Rising Secure Access Tech Investment
Digital Transformation Increasing
Hybrid IT Service Delivery
30%
44%
30%
Data Center + Public Cloud
+ Private Cloud
Data Center + Public Cloud
23%
Utilize all three delivery
environments
Increase in Future Spend
55%
Unauthorized/vulnerable endpoint use
Mobile or web app exposure
Unauthorized data and resource access by
insecure endpoint or privileged users
61%
Unauthorized app/resource access including
lax authentication or encryption
Considering Tool Consolidation
48%
Most Impactful Access Security Incidents
Malware
41%
Increasing Budget
by 5-15%
Increasing budget
Data Center + Private Cloud
26%
20%
Increasing Budget
by 15-25%
91%
Little to modest confidence to
mitigate access threats
Nearly half experienced unauthorised
access to data and resources due to
insecure endpoints and privileged users,
as well as unauthorised application
access due to poor authentication or
encryption controls. ◊
46%
Unauthorized app/resource access including
lax authentication or encryption
Little to modest confidence to
mitigate access threats
Increase in Future Spend
Over the last 18 months, at least half
of all companies across every region
had dealt with malware, unauthorised/
vulnerable endpoint use and mobile or
web apps exposures.
49%
Unauthorized data and resource access by
insecure endpoint or privileged users
Key findings
The global survey found the most
impactful incidents were contributed by
a lack of user and device access visibility
and lax endpoint, authentication and
authorisation access controls.
52%
Mobile or web app exposure
IT open to reduce
number of tools and
explore suites
2.8
Contributes to Visibility, Enforcement, Audit Gaps
46%
45%
Access Security Tech Trends
Valued Features
Software Defined Perimeter
Performance and Scalability
DevOps App Delivery Automation
Data Center and Cloud
Platform Support
Defining access and protection requisites
User Experience, Client
and Client-less Operation
Enforcing user and device access policy
Identity and Endpoint
access management
IoT device and BYOD access
Larger enterprises
use at least 30%
more tools
[NGFW, UTM, VPN,
NAC, MDM]
49%
Top Control Gaps
30%+
Companies on
average use nearly
3 or more tools
52%
Price and Ease of Administration
Dynamic access authentication and protection
64%
59%
Start Project within 18 Months
56%
Planning Project
beyond 18 Months 14%
58%
57%
56%
Outsourcing
Organizations Take Action to Resolve Hybrid IT
Access Security Deficiencies
NEARLY HALF EXPERIENCED
48%
46%
UNAUTHORISED ACCESS TO DATA
44%
AND RESOURCES DUE TO INSECURE
42%
42%
ENDPOINTS AND PRIVILEGED
USERS
Key Enterprise
Priorities
38%
7%
Use MSSP for
Secure Access
Planned increase in
next 24 months
Improve endpoint security,
remediation prior to access
Enhance IoT discovery, isolation
and access control
Fortify network, cloud access visibility
and resource segmentation
Refine privileged user or service
account-based access
Augment app workload delivery
and protection
Rising Secure Access Tech Investment
Remote VPN and Cloud Access 37% MDM/BYOD 37%
IAM and CASB 39% NAC 35%
NGFW Management 39% SDP 35%
Get the full report and learn more about Hybrid
IT and Zero Trust Network Access trends at
www.pulsesecure.net/SESA19
“2019 State of Enterprise Secure Access” report issued May, 2019 by IDG Connect and Pulse Secure. ©2019 IDG Connect and Pulse Secure
30%
www.intelligentdatacentres.com
91%
Increasing budget
Increasing Budget
by 15-25%
41%
Increasing Budget
by 5-15%
Considering Tool Consolidation
Issue 06
25