Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
COPENHAGEN, Denmark and BOSTON, May 25, 2022
Forty percent of those surveyed do not include business-critical systems such as SAP in their cybersecurity monitoring
COPENHAGEN, Denmark and BOSTON, May 25, 2022 /PRNewswire/ -- Logpoint has today announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll, issued on Twitter, was targeted at cybersecurity and IT professionals in both the US and UK.
The poll revealed the extent of insecure and unmonitored business-critical systems, with 40 percent noting that they do not include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent were unsure if it was included in their cybersecurity monitoring at all. This is concerning given that SAP serves as the core system behind every aspect of business operations. Not including this in the centralized security monitoring solution leaves organizations vulnerable and exposed to the risk of cyber threats.
"Considering that 77 percent of global transactions touch an SAP system, protecting it against cyber-attacks is vital. Organizations store their most critical assets within SAP, and this data must be protected. SAP systems require extensive protection and security monitoring, and businesses need to ensure they have an integrated security operations platform that monitors all IT infrastructure to ensure they have complete visibility into their SAP system," said Andrew Lintell, Logpoint VP for EMEA.
Furthermore, when asked how they currently review SAP logs for cybersecurity events or cyber threat activity, almost 30 percent of respondents admitted to not reviewing SAP logs in any way, and again, nearly 30 percent said they didn't know if this was being monitored. Failure to do so can create a blind spot for businesses and make it challenging to detect and quickly respond to fraud and threats within SAP.
To add to this, only 23 percent said the process of reviewing SAP logs for cybersecurity events or cyber threat activity was automated through SIEM, with almost 19 percent still doing so manually.
"Bringing SAP systems under the remit of cybersecurity solutions can massively reduce the security risks and provide logs to aid any audit processes. Accommodating it within the SIEM, for example, can enable these applications to benefit from automation and continuous monitoring, as well as coordinated threat detection and response with log storage and log management, to assist in subsequent investigations," commented Lintell.
"The problem though, is that businesses are trying to fill the gaps in their cybersecurity stacks by devoting more spend to a growing litany of cloud security products, with many toolsets and features going unused or resulting in configuration failure and, ultimately, data breaches that could be avoided," Lintell added.
For those businesses looking to invest in cloud security, a near 40 percent of respondents regarded software licensing in the cloud as too expensive, with 24 percent declaring it led to unknown future costs. Lock-in or lack of control with software licensing was also flagged as an issue by 22 percent, along with a lack of user-based licensing options by 14 percent, as the predominant model of charging is data usage-based.
Lintell commented - "Businesses must continue to build out their cloud presence, and the market is seeing some natural consolidation as complementary technologies such as SIEM and SOAR converge. There are cost-effective options available, and a SaaS all-in-one solution can limit the costs associated with licensing, particularly if it's based on the number of devices sending data rather than on the volume of your data, which is where businesses are seeing costs escalate".
Contact:
Mads Lindberg, Tel.: +45 3031 7141, E-mail: mal@logpoint.com
Photo - https://mma.prnewswire.com/media/1825811/Logpoint_Twitter_Poll.jpg
View original content to download multimedia:https://www.prnewswire.com/news-releases/logpoint-poll-highlights-extent-of-insecure-and-unmonitored-business-critical-systems-301555021.html
SOURCE Logpoint
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs