SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Businesses put more on
the table with every advancement
in technology, so they have to
MANAGE RISK
Regain control of your businesses
sensitive apps & data
Visibility, identity & access
management are key to protecting
apps & data in all stages of use – no matter
the cloud, network or device
Share & embrace emerging
technologies, & use them to
your security advantage
Survey Methodology The report conducted by the Ponemon Institute and sponsored by Citrix,
“The Need for a New IT Security Architecture: Global Study” looked at global trends in IT security
risks and reasons why security practices and policies need to evolve in order to handle threats
from disruptive technologies, cybercrime and compliance mandates. The research features
insights from more than 4,200 IT and IT security practitioners in Australia/New Zealand, Brazil,
Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates,
United Kingdom and the United States.
To learn more about the findings from this survey,
visit Citrix.com/secure or read the blog from
Citrix Chief Security Officer, Stan Black.
83% say
the complexity
of business & IT
operations makes
them vulnerable
79%
worry most
about breaches
of high-value
information
74% say a
new IT security
framework is
needed to improve
security posture
71%
say there is risk from
their inability to
control employees’
devices & apps
74%
say there is
employee
complacency
about security
BUT THE RULES KEEP CHANGING!
Data, network & app integrations
are on the rise…
& so are cyber attacks!
Employ strong network, app &
data security, as well as secure
compliant enterprise file sync
& share solutions
An increase in data assets is
UPPING THE ANTE
WHAT CITRIX HELPS YOU DO
Keys to reducing the security risk over the next two years
in building a new IT infrastructure:
72%
73%
say data
management
AJ
76%
say app
management
say configuration
management
78%
say the increase puts
more information at risk
The
HIGH STAKES
business security
of

Más contenido relacionado

Destacado

Presentatie jenny gierveld
Presentatie jenny gierveldPresentatie jenny gierveld
Presentatie jenny gierveld
Radboudumc
 

Destacado (12)

Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolve
 
Inge Roes
Inge RoesInge Roes
Inge Roes
 
Presentatie jenny gierveld
Presentatie jenny gierveldPresentatie jenny gierveld
Presentatie jenny gierveld
 
3 jaar campagne '24 uur niet roken' Guido Van Hal
3 jaar campagne '24 uur niet roken' Guido Van Hal3 jaar campagne '24 uur niet roken' Guido Van Hal
3 jaar campagne '24 uur niet roken' Guido Van Hal
 
Guide to Quitting Smoking
Guide to Quitting SmokingGuide to Quitting Smoking
Guide to Quitting Smoking
 
2557 โครงงาน
2557 โครงงาน 2557 โครงงาน
2557 โครงงาน
 
Studenten stoppen met roken, Hilde Vandecasteele
Studenten stoppen met roken, Hilde VandecasteeleStudenten stoppen met roken, Hilde Vandecasteele
Studenten stoppen met roken, Hilde Vandecasteele
 
Five ways to drive process adoption
Five ways to drive process adoptionFive ways to drive process adoption
Five ways to drive process adoption
 
Varenicline (Champix) bij het stoppen met roken
Varenicline (Champix) bij het stoppen met rokenVarenicline (Champix) bij het stoppen met roken
Varenicline (Champix) bij het stoppen met roken
 
Random Acts of Kindness
Random Acts of KindnessRandom Acts of Kindness
Random Acts of Kindness
 
Benefits of quitting smoking
Benefits of quitting smokingBenefits of quitting smoking
Benefits of quitting smoking
 
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile EnterpriseUnified Endpoint Management: Security & Productivity for the Mobile Enterprise
Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
 

Más de Citrix

Más de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

The High Stakes of Business Security [Infographic]

  • 1. Businesses put more on the table with every advancement in technology, so they have to MANAGE RISK Regain control of your businesses sensitive apps & data Visibility, identity & access management are key to protecting apps & data in all stages of use – no matter the cloud, network or device Share & embrace emerging technologies, & use them to your security advantage Survey Methodology The report conducted by the Ponemon Institute and sponsored by Citrix, “The Need for a New IT Security Architecture: Global Study” looked at global trends in IT security risks and reasons why security practices and policies need to evolve in order to handle threats from disruptive technologies, cybercrime and compliance mandates. The research features insights from more than 4,200 IT and IT security practitioners in Australia/New Zealand, Brazil, Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates, United Kingdom and the United States. To learn more about the findings from this survey, visit Citrix.com/secure or read the blog from Citrix Chief Security Officer, Stan Black. 83% say the complexity of business & IT operations makes them vulnerable 79% worry most about breaches of high-value information 74% say a new IT security framework is needed to improve security posture 71% say there is risk from their inability to control employees’ devices & apps 74% say there is employee complacency about security BUT THE RULES KEEP CHANGING! Data, network & app integrations are on the rise… & so are cyber attacks! Employ strong network, app & data security, as well as secure compliant enterprise file sync & share solutions An increase in data assets is UPPING THE ANTE WHAT CITRIX HELPS YOU DO Keys to reducing the security risk over the next two years in building a new IT infrastructure: 72% 73% say data management AJ 76% say app management say configuration management 78% say the increase puts more information at risk The HIGH STAKES business security of