IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Tech firms that proactively root out security flaws are in high demand

Organizations are showing increasing enthusiasm for vendor transparency over security

According to a new survey, most organizations would prefer tech providers to be more proactive in securing their offerings.

Around three-quarters of IT security professionals (73%) said their organizations are more likely to purchase technology and services from companies that find, mitigate, and communicate security vulnerabilities proactively. 

The survey, conducted by Ponemon Institute and commissioned by Intel looked into what affects an organization’s security technology investment decision-making.

The study of IT security professionals in the US, UK, Europe, the Middle East, Africa, and Latin America, found that 76% of respondents believe it’s highly important their technology provider offers hardware-assisted capabilities to mitigate software exploits. 

The report found that 66% of those surveyed said it was highly important for vendors to have the “ability to identify vulnerabilities in its products and mitigate them.” However, only 46% of respondents said their current technology provider has this capability.

Nearly two-thirds (64%) of respondents said it’s highly important for their technology provider to be transparent about available security updates and mitigations. However, less than half (48%) of respondents say their technology providers have this capability.

The survey found that 74% of respondents said it’s highly important for their technology provider to apply ethical hacking practices to identify and address vulnerabilities in its products proactively.

The report said that of all the capabilities represented in this research, “the most important is the technology provider’s capability to apply ethical hacking practices to proactively identify and address vulnerabilities in its products and to provide ongoing assurance and evidence that the components are operating in a known and trusted state.”

The report also said organizations’ budgets are not sufficient to support a strong security posture. Eighty-six percent of respondents said their IT budgets were only adequate.

Other barriers to security deployment included interoperability (63%), installation costs (58%), system complexity (57%), vendor support hurdles (55%), and issues with scalability (53%).

When it comes to patching, only 30% of respondents said their organizations could patch critical or high-priority vulnerabilities in a week or less. On average, it takes almost six weeks to patch a detected vulnerability. These delays were due to human error (63%), the inability to take applications or systems offline to apply a patch (58%), or not having adequate visibility of affected systems across the organization (52%), the report found.

“Security doesn’t just happen,” said Suzy Greenberg, vice president, Intel Product Assurance and Security. “If you are not finding vulnerabilities, then you are not looking hard enough.”

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

What is hacktivism?
hacking

What is hacktivism?

27 May 2022
Protecting healthcare from cybercrime
Whitepaper

Protecting healthcare from cybercrime

25 May 2022
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022

Most Popular

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

26 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022