TMCnet - World's Largest Communications and Technology Community



Insight Into Senior IT Executives' Top Security Concerns Revealed During Live Polling at Courion's Annual User Conference, CONVERGE
[June 03, 2014]

Insight Into Senior IT Executives' Top Security Concerns Revealed During Live Polling at Courion's Annual User Conference, CONVERGE

WESTBOROUGH, Mass. --(Business Wire)--

Most C-level executives would agree that protecting a company's confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive polling1 of senior IT security executives at CONVERGE, Courion's (News - Alert) annual user conference in New Orleans, revealed that 65 percent are aware that their company has experienced a computer intrusion in which data was stolen, and 55 percent have discovered a current employee or insider taking information from the company's computer system to use in a competing business.

During his presentation at the conference, Assistant U.S. Attorney Kyle F. Waldinger, who has prosecuted with the Computer Hacking and Intellectual Property (CHIP) unit of the U.S. attorney's office for the northern district of California, demonstrated through these poll questions the threat that global multinational companies face, even from their own employees. Unfortunately, current legislation makes it challenging for the federal government to prosecute potential offenders.

And information security and identity and access management departments don't always work together to reduce the risks that lead to breaches caused by insiders, as revealed by a live poll conducted later in the conference by presenter Jon Oltsik, a senior principal analyst with Enterprise Strategy Group (News - Alert) (ESG). Fourteen percent identified organizational issues between IAM and the information security groups as the biggest impediment to greater cooperation, while 12 percent cited budget issues, 11 percent cited technology integration issues, and nine percent pinned the problem on a skills shortage. 47 percent of attendees felt that all of these reasons posed a challenge to greater integration of IAM controls within security.

Nonetheless, Oltsik made the case that by better integrating IAM analytics with security, global companies gain access to the contextual access controls needed to reduce their overall attack surface and lower IT risk. By using IAM big data security analytics, or identity and access intelligence software, companies are better equipped to eliminate ungoverned accounts and better manage Segregation of Duties (SoD) and privileged account access. "Multinational corporations should be leveraging IAM big data security analytics now, not only to improve their ability to detect and respond to possible breaches, but to streamline IAM processes and improve oversight capabilities," said Oltsik.

In fact, the recent 2014 Verizon Data Breach Incident Report recommends the following IAM controls:

• Know your data and who has access to it

• Review user accounts

• Watch for data exfiltration

• Publish audit results

Further, the SANS Institute's Version 5 Critical Security Controls include:

• Controlled use of administrative privileges

• Maintenance, monitoring and analysis of audit logs

• Account monitoring and control

• Data protection

To learn more about how you can add intelligent identity and access management solutions to your security controls, contact 866.Courion or

About Courion

With almost two decades of experience and more than 600 customers worldwide, Courion is the market leader in Identity and Access Management (IAM), from provisioning to governance to Identity and Access Intelligence (News - Alert) (IAI). Courion provides insight by analyzing the big data generated from an organization's identity and access relationships so companies can efficiently provision access, uncover hidden risks and stay compliant. With Courion, you can confidently provide the open access today's world demands while protecting critical business information from unauthorized use. Courion is headquartered in Westborough, Mass., with an office in Manchester, U.K., and a technology center in Pune, India, as well as a global network of technology partnersauthorized resellersmanaged service providers and system integrators. For more information, please visit or read

To read this release online, go to:

Courion is a registered trademark of Courion Corporation. All rights reserved. All other company and product names may be trademarks of their respective owners.

1 Poll of >100 senior IT security executives with a response rate of >55%.

[ Back To's Homepage ]

Technology Marketing Corporation

35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments:
Comments about this site:


© 2017 Technology Marketing Corporation. All rights reserved | Privacy Policy