Compliance requirements vary from one industry to the next. In an ideal world, it would be nice if compliance were simply the byproduct of a good security program, but things rarely work that perfectly; compliance and security each represent their own set of diverging requirements. The 2018 Voice of the Enterprise: Information Security, Workloads and Key Projects survey of 552 security professionals looks at the trends and factors affecting security teams and project prioritization.


The 451 Take

The attention around the General Data Protection Regulation (GDPR), with its timelines for notification, new requirements for identity and privacy, and significant potential fines, has added to substantial industry requirements already present and pushed compliance requirements to the top of the list of pain points and security projects.

Report Highlights

  • Top pain points – While end-user behavior continues to be a top pain point for companies with fewer than 10,000 employees, respondents from very large organizations are struggling with cloud security.
  • Compliance jumps the queue – The EU enactment of the GDPR in May has pushed compliance to the forefront of security project priorities for the coming year.
  • Endpoint security – Endpoint security remains relevant. It is still the most widely adopted (91%) security technology across organizations of all sizes.
  • Compromised endpoints – On average, companies with fewer than 1,000 employees spend 5.2 hours a week cleaning up compromised endpoints. Larger organizations with many more endpoints to manage are spending 8.5 and 13.5 hours a week.

Top Security Pain Points

User behavior continues to be a top pain point for companies with fewer than 10,000 employees. A closer look at the top three security pain points by company size shows that for 39% of very large organizations, cloud security is their top paint point.

Figure 1: Top Security Pain Points by Company Size


Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Compliance Jumps the Queue

What constitutes compliance is very industry-specific (e.g., Gramm-Leach-Bliley Act, HIPAA, HITECH, etc.), but the breach notification timelines and fines associated with the European Union GDPR enacted on May 25 has gotten the attention of many security managers. The GDPR not only applies to organizations located within the EU, but it will also apply to all companies processing and holding the personal data of data subjects residing in the EU, regardless of the company's location. Companies out of compliance can face steep fines.

Although compliance has been an ongoing concern, GDPR is causing a reprioritization of security project plans, and in some cases, has derailed them – especially in Europe. Instead, companies are focusing on inventorying systems against new concepts of identity and remediating identified gaps. Consequently, regulatory compliance (PCI compliance, GDRP, PSD2, NIST) is the top security project for 35% of respondents over the next 12 months, and this is true for organizations of all sizes. That number jumps to 40% for very large organizations with more than 10,000 employees.

Figure 2: Top Security Projects

Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Project Approval Drivers

For the last three years, some manner of risk assessment has been the most common driver moving security projects forward. In 2018, compliance requirements (23%) are edging out risk assessment (22%) as the top factor in security projects being approved and prioritized.

Figure 3: Drivers for Security Project Approval 


Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Endpoint Security

Endpoint security remains relevant; even as new architectures come further into play, protecting users' endpoints remains a concern. Endpoint security (91%) is still the most widely adopted security technology across organizations of all sizes. This is followed closely by firewall (86%) and email security (86%).

Figure 4: Security Technology in Use 

Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Compromised Endpoints

Endpoints are critical points of vulnerability. When endpoints are compromised, that device transforms from a secure endpoint on the corporate network to an exploitable access point vulnerable to external cyber attacks. This exposes not just the device, but the entire corporate network to the threat. On average, companies with fewer than 1,000 employees spend 5.2 hours a week cleaning up compromised endpoints. Larger organizations with many more endpoints to manage are spending 8.5 and 13.5 hours a week, on average.

Figure 5: Time Spent Cleaning Up Compromised Endpoints 


Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Dealing with Compromised Endpoints

The remediation process is time-consuming because it is highly manual – 52% of respondents are forced to re-image the system if other forms fail, and another 50% manually clean the compromised system.

Figure 6: Remediation of Endpoints  

Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Push to Decrease Endpoint Tools

Organizations are pushing back against the number of tools they're running on each endpoint. On average, organizations have three (2.8) endpoint security solutions running. Larger enterprises (10,000-plus employees) have closer to four.

Figure 7: Deployed Endpoint Security Offerings 

Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018

Primary Users of Endpoint Security Tools 

The primary user of endpoint security tools varies by company size. For half of very large organizations with more than 10,000 employees, the security operations team is the primary user. However, for smaller enterprise with fewer than 1,000 employees, the desktop/IT team is the primary user.

Figure 8: Primary Endpoint Security Users 

Source: Voice of the Enterprise: Information Security, Workloads and Key Projects 2018
Daniel Kennedy
Research Director, Voice of the Enterprise: Information Security

Daniel Kennedy is responsible for managing all phases of the research process. He is an experienced information security professional who has written for both Forbes online and Ziff Davis, has provided commentary to numerous news outlets including The New York Times and The Wall Street Journal, and his personal blog Praetorian Prefect was recognized as one of the top five technical blogs in information security by the RSA 2010 Conference.

Jeremy Korn
Research Associate

Jeremy Korn is a Research Associate at 451 Research. He graduated from Brown University with a BA in Biology and East Asian Studies and received a MA in East Asian Studies from Harvard University, where he employed quantitative and qualitative methodologies to study the Chinese film industry.

Aaron Sherrill
Senior Analyst

Aaron Sherrill is a Senior Analyst for 451 Research covering emerging trends, innovation and disruption in the Managed Services and Managed Security Services sectors. Aaron has 20+ years of experience across several industries including serving in IT management for the Federal Bureau of Investigation.

Want to read more? Request a trial now.