Telecom Lead India: 66 percent CIOs in Indian enterprises encourages employees to bring their own device (BYOD) to work and 44 percent allow employees to select and use a specific set of personally owned devices.
According to a Cisco and the Data Security Council of India (DSCI) study, 72 percent of security leaders and CIOs witnessed an increased demand for flexibility in using endpoint devices. 59 percent believe rigid policies around the endpoints are frustrating business users.
As part of the joint study called Reinventing the Network in the Context of Security, DSCI covered 90 security officers and CIOs from enterprises and interviewed them in December 2012.
63 percent agree the business groups and their access requirements are getting complex, while 64 percent indicate there has been a rapid increase in requests for authorizing access to mobile devices.
58 percent allow controlled access to emails and calendars and 40 percent offer desktop virtualization access from any device.
46 percent said the adoption of cloud is leading to multiple connection of external application or externally provisioned systems.
40 percent said the increasing adoption of cloud storage facilities causes data to be placed away from the organization’s boundaries.
52 percent agreed that they see an increasing adoption of cloud-based applications.
77 percent said attacks are originating from multiple channels and the attack payload is getting increasingly advanced.
69 percent reveal that managing policies and configuration of devices is a complex undertaking.
Threat and malware protection (86 percent), quarantine of non-standard devices (83 percent), enforceability of network policy on mobile devices (83 percent), encryption of communication and data (79 percent), and security scanning of mobile devices (75 percent) were key concerns for the protection of the endpoints.
40 percent consider securing the advanced mobility enabled enterprise applications a key challenge.
The survey also says that 62 percent believes that applications are no longer residing in the corporate data center.
56 percent felt current solutions are ineffective in managing the security of mobile, BYOD, and virtualization. 53 percent don’t have the capability of integrating external and internal intelligence.
43 percent indicate that capabilities for detecting & blocking attacks that detect known vulnerabilities are insufficient to address threats in the present scenario.
53 percent said that their existing solutions are incompetent to withstand sophisticated, targeted & persistent threats.