Tech firms that proactively root out security flaws are in high demand
Organizations are showing increasing enthusiasm for vendor transparency over security
According to a new survey, most organizations would prefer tech providers to be more proactive in securing their offerings.
Around three-quarters of IT security professionals (73%) said their organizations are more likely to purchase technology and services from companies that find, mitigate, and communicate security vulnerabilities proactively.
The study of IT security professionals in the US, UK, Europe, the Middle East, Africa, and Latin America, found that 76% of respondents believe it’s highly important their technology provider offers hardware-assisted capabilities to mitigate software exploits.
The report found that 66% of those surveyed said it was highly important for vendors to have the “ability to identify vulnerabilities in its products and mitigate them.” However, only 46% of respondents said their current technology provider has this capability.
Nearly two-thirds (64%) of respondents said it’s highly important for their technology provider to be transparent about available security updates and mitigations. However, less than half (48%) of respondents say their technology providers have this capability.
The survey found that 74% of respondents said it’s highly important for their technology provider to apply ethical hacking practices to identify and address vulnerabilities in its products proactively.
The report said that of all the capabilities represented in this research, “the most important is the technology provider’s capability to apply ethical hacking practices to proactively identify and address vulnerabilities in its products and to provide ongoing assurance and evidence that the components are operating in a known and trusted state.”
The report also said organizations’ budgets are not sufficient to support a strong security posture. Eighty-six percent of respondents said their IT budgets were only adequate.
Other barriers to security deployment included interoperability (63%), installation costs (58%), system complexity (57%), vendor support hurdles (55%), and issues with scalability (53%).
When it comes to patching, only 30% of respondents said their organizations could patch critical or high-priority vulnerabilities in a week or less. On average, it takes almost six weeks to patch a detected vulnerability. These delays were due to human error (63%), the inability to take applications or systems offline to apply a patch (58%), or not having adequate visibility of affected systems across the organization (52%), the report found.
“Security doesn’t just happen,” said Suzy Greenberg, vice president, Intel Product Assurance and Security. “If you are not finding vulnerabilities, then you are not looking hard enough.”
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now