Infographic

Emerging Best Practice in the Use of Proactive Security

Research carried out by Omdia has found that organizations now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management; making proactive security a top cybersecurity goal for organizations in the next 12-24 months.

Tick in front of shield graphic

From "assume breach"
to proactive defense

While the cybersecurity industry has clung to the "assume breach" mantra with its preventative and reactive solutions, organizations are awakening to a smarter strategy: proactively understanding attack surfaces, mapping attack paths, and plugging vulnerabilities to prevent breaches.
 
One of the biggest challenges highlighted in the research is that many organizations have limited visibility into their network assets, with a significant portion only monitoring a sample of devices or devices in critical segments rather than every device across their entire attack surface.
Infographic: Emerging best practice in the use of proactive security solutions
omdia-informa-logo-black

"Network device configurations are an important component of security posture management. The need to correctly configure network devices, particularly externally facing devices, in a secure state (and then maintain that state) is a critical component of attack surface reduction and effective risk management."

Omdia
Tick in front of shield graphic

Increased investment in proactive security solutions

Respondents reported increased investment in proactive security solutions over preventative and reactive measures during the last twelve months. Preventative and reactive solutions will not disappear, but organizations are shuffling their spending priorities and looking for the better ROI that proactive security solutions promise to deliver. The three most common priorities include:

  • Reduce the opportunity for threats with proactive security;
  • Reduce mean time to remediate known vulnerabilities; and
  • Minimize attack surface with proactive configuration drift monitoring.

Emerging Best Practice in the Use of Proactive Security Solutions