Tech firms that proactively root out security flaws are in high demand

Organizations are showing increasing enthusiasm for vendor transparency over security

According to a new survey, most organizations would prefer tech providers to be more proactive in securing their offerings.

Around three-quarters of IT security professionals (73%) said their organizations are more likely to purchase technology and services from companies that find, mitigate, and communicate security vulnerabilities proactively. 

The survey, conducted by Ponemon Institute and commissioned by Intel looked into what affects an organization’s security technology investment decision-making.

The study of IT security professionals in the US, UK, Europe, the Middle East, Africa, and Latin America, found that 76% of respondents believe it’s highly important their technology provider offers hardware-assisted capabilities to mitigate software exploits. 

The report found that 66% of those surveyed said it was highly important for vendors to have the “ability to identify vulnerabilities in its products and mitigate them.” However, only 46% of respondents said their current technology provider has this capability.

Nearly two-thirds (64%) of respondents said it’s highly important for their technology provider to be transparent about available security updates and mitigations. However, less than half (48%) of respondents say their technology providers have this capability.

The survey found that 74% of respondents said it’s highly important for their technology provider to apply ethical hacking practices to identify and address vulnerabilities in its products proactively.

The report said that of all the capabilities represented in this research, “the most important is the technology provider’s capability to apply ethical hacking practices to proactively identify and address vulnerabilities in its products and to provide ongoing assurance and evidence that the components are operating in a known and trusted state.”

The report also said organizations’ budgets are not sufficient to support a strong security posture. Eighty-six percent of respondents said their IT budgets were only adequate.

Other barriers to security deployment included interoperability (63%), installation costs (58%), system complexity (57%), vendor support hurdles (55%), and issues with scalability (53%).

When it comes to patching, only 30% of respondents said their organizations could patch critical or high-priority vulnerabilities in a week or less. On average, it takes almost six weeks to patch a detected vulnerability. These delays were due to human error (63%), the inability to take applications or systems offline to apply a patch (58%), or not having adequate visibility of affected systems across the organization (52%), the report found.

“Security doesn’t just happen,” said Suzy Greenberg, vice president, Intel Product Assurance and Security. “If you are not finding vulnerabilities, then you are not looking hard enough.”

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

Ransomware hit industrial sector the hardest in the third quarter
ransomware

Ransomware hit industrial sector the hardest in the third quarter

25 Oct 2021
Tesco services knocked offline after suspected cyber attack
hacking

Tesco services knocked offline after suspected cyber attack

25 Oct 2021
Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021
Ofcom report reveals alarming uptick in smishing attacks
scams

Ofcom report reveals alarming uptick in smishing attacks

22 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Royal Mint to recover gold from smartphones and laptops in world first
Technology

Royal Mint to recover gold from smartphones and laptops in world first

21 Oct 2021