JNPR Juniper Networks Inc.

Enterprise Security Challenges Heightened by Work-from-Home Spike, New Research Shows

Enterprise Security Challenges Heightened by Work-from-Home Spike, New Research Shows

Sudden changes in priorities, poor network visibility and lack of time cited as key issues for security professionals struggling to cope with new norms

SUNNYVALE, Calif., Sept. 01, 2020 (GLOBE NEWSWIRE) -- , a leader in secure, AI-driven networks, today announced the initial findings of an international market research project stating that traditional approaches to securing the network are amplifying challenges in the face of budget constraints and an increasingly remote workforce. Juniper Networks has commissioned the study from independent research agency Vanson Bourne which explores the attitudes, perspectives and concerns of 1,000 senior IT networking and security professionals drawn from various industry sectors around the world.

A clear and pertinent picture emerged from the data: network security is an ever-present and growing headache for IT teams, especially in the current climate of mass-scale remote working. Their task is compounded by network performance issues, an inability to upgrade the entire network and the daily grind of basic network maintenance which inhibits further innovation. An added challenge often occurs in an organization’s positioning of security as a resource drain rather than as a business benefit. The solution they overwhelmingly yearn for appears to lie in integrated visibility within the network for more accuracy providing data-driven context to faster security tools, automation and widespread policy enforcement to overcome these challenges. This required approach would enable teams to deliver meaningful insight at scale, while avoiding additional cost and freeing up teams to pursue more strategic projects.

Top highlights from the Vanson Bourne study are as follows:

  • Ninety-seven percent (97%) of survey respondents admitted that they are specifically experiencing ongoing challenges when attempting to secure their organization’s network effectively. It bears repeating that the IT challenges present before the sudden increase in remote work have been amplified significantly against a burgeoning threat landscape, populated by prolific, highly motivated ‘bad actors’ who constantly innovate and take advantage of every opportunity to thrive and remain undetected. Meanwhile, IT and Security professionals are further challenged with the need to balance necessary business demands against security, even when they are aware these changes extend the attack surface of their organization’s network infrastructure and demand further protection.

     
  • Eighty-six percent (86%) of survey respondents felt that they need to improve network reliability and performance. Especially in the current climate of enforced remote working for larger-than-usual employee numbers, the network is the ‘beating heart’ of any organization undergoing or sustaining digital transformation. To be fully effective, a security deployment must be fully integrated into the network it protects, rather than an uncoupled overlay. Moreover, on average forty-seven (47%) of IT employees’ time is absorbed by ‘keeping the lights on’ in the network instead of pursuing innovation.

     
  • Eighty-seven percent (87%) of survey respondents seek a security solution to give better visibility across existing apps, reducing false positives and improving threat response times. The underlying subtext is that IT/Security teams lack time, which makes the pursuit of false positives frustrating and may lead to costly human error-driven mistakes. The net result is that timely mitigation of genuine threats could be hampered. As a result, team leaders crave real-time visibility into their organization’s data and network, adding context to better understand what is happening. They are also keen to balance the demands of delivering compliance with managing security risks effectively. However, the prospect of wholesale ‘rip-and-replace’ to introduce integrated security is not viable nor attractive.

     
  • Sixty-three percent (63%) of respondents stated that their organization positions IT security as a cost center rather than as a value-driving asset. In contrast ninety-seven percent (97%) stated that they had been obliged to spend money on breach mitigation in the last twelve months, with the average cost being more than US$276,000. This suggests that organizations do not fully realize how vulnerable their networks are to attack and that reluctance to invest in intelligent security is counter-productive, both to the bottom line and to grasping tangible business benefits proactively.

     
  • Ninety-five percent (95%) of survey respondents are working with multiple vendors in pursuit of their overall security deployment goals. This suggests that IT and Security professionals are pragmatic in their attempts to navigate a successful course through all the conflicting challenges in their path, including compliance, costs, departmental preferences and demands. It also suggests that many IT/Security teams are currently driven to seek an answer to the reduced false positives/improved response times requirement from various sources simultaneously.

“There is a clear narrative among senior IT and security professionals that is overwhelmingly confirmed in this survey. Put simply, they know network security is hugely important, with failure increasingly carrying significant risk for their organization. For me, the most compelling statistic is that ninety-nine percent (99%) agree that a threat-aware network* would bring benefits to  their organization. As workers become more distributed and threats become more sophisticated, security professionals are faced with new and emerging challenges that put enterprises at even greater risk than before. Companies need threat-aware networks that bring speed and agility to enterprise security, coupled with a Connected Security strategy that allows all network elements to work together for increased visibility and action where it matters most. The old way of thinking about security will no longer suffice for those companies battling a new norm.”

      -      Samantha Madrid, VP of Security Business & Strategy, Juniper Networks

Methodology

A thousand CIOs, CISOs, CTOs, IT Directors, Network Architects, Security Directors and IT Security Specialists were surveyed across nine countries (France, Germany, Israel, Italy, Kingdom of Saudi Arabia, the Netherlands, UAE, the UK and the US), in June/July 2020. The survey reached a wide cross-section of vertical industries in both public and private sectors, including education, financial services, government, healthcare, IT & telecoms, manufacturing & production, media, leisure & entertainment, retail, transport and utilities/energy. The size of organizations represented by respondents ranged between 1,000 and upward of 5,000 employees. The research was conducted on Juniper’s behalf by ., and respondents were not made aware of the company commissioning the research.

*Threat-aware network definition supplied to survey respondents: Critical security components are visibility and enforcement – everywhere. In addition to perimeter defences, a true threat-aware network has the ability to enforce security at any location; from routers to switches, in the cloud and across all the links which bind the organisation together.

Additional Resources

  • Illustrated video:
  • Blog:

About Juniper Networks

Juniper Networks challenges the inherent complexity that comes with networking and security in the multicloud era. We do this with products, solutions and services that transform the way people connect, work and live. We simplify the process of transitioning to a secure and automated multicloud environment to enable secure, AI-driven networks that connect the world. Additional information can be found at Juniper Networks () or connect with Juniper on ,  and .

Juniper Networks, the Juniper Networks logo, Juniper, Junos, and other trademarks listed are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners.

Media Relations:
Penny Still
Juniper Networks
+44 (0) 1372 385 692
 
EN
01/09/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Juniper Networks Inc.

Pierre FerraguÊ
  • Pierre FerraguÊ

The Great Replatforming, part I – the Special Theory

Capex ROI is the trending question these days, but what does it actually mean? In a “replatforming”, capex are enablers of revenue growth and productivity enhancements, as long as they are the foundation for a good “right to make money” (a defensible competitive advantage) and meet good demand. Our “Special Replatforming Theory” looks at how it has been at play for a decade already at hyperscalers, and how we expect the next 10 years to play out, with AI bringing an even more capital-intensive...

Pierre FerraguÊ
  • Pierre FerraguÊ

Growth in Public Cloud: Where from? What’s next?

Growth in Public Cloud reaccelerated, in line with our expectations, and, if anything, even stronger than we thought, and shifting fast, with AI representing an increasing share of public cloud growth, and with the fast-growing crowd of native AI start-ups becoming a meaningful segment. We gathered all the initial datapoints at hand and looked at all angles we could, to provide a first perspective of how public cloud is growing today and where it is headed next.

Pierre FerraguÊ
  • Pierre FerraguÊ

Bible 1Q25 – Hyperscale & Cloud: Inference inflecting, more hints on 2...

Today, we are publishing the Hyperscale & Cloud section of our 27th Tech Infrastructure Quarterly Bible. The Tech Bible is a must-read for any tech investor, as it summarizes the quarterly earnings reports from the over 140 companies we track, providing an update on our key perspectives and convictions. In the coming weeks we will publish sections on Telecom Infrastructure, Memory, Enterprise IT, and PCs. Hyperscale revenues grew 11% YoY, with cloud services stabilizing in the mid-20%, and acce...

Pierre FerraguÊ
  • Pierre FerraguÊ

Bible 4Q24 – Hyperscale & Cloud: material capex revisions, now consist...

Today, we are publishing the Hyperscale & Cloud section of our 26th Tech Infrastructure Quarterly Bible. The Tech Bible is a must-read for any tech investor, as it summarizes the quarterly earnings reports from the over 140 companies we track, providing an update on our key perspectives and convictions. Hyperscale revenues grew 11% YoY, with cloud services stabilizing in the mid-20%, driven by strong demand for both traditional & AI infrastructure. Capex grew 73% YoY and 25% QoQ, 11% above con...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch