Perimeter defence no longer adequate for security


By Dylan Bushell-Embling
Tuesday, 11 November, 2014


Perimeter defence no longer adequate for security

Security experts overwhelmingly agree that cybersecurity needs have changed in the last 12 months, to the extent that ‘perimeter defence’ is no longer adequate.

A survey by Ari Kaplan Advisors, commissioned by Nuix, shows that 73% of security professionals agree that cybersecurity needs have changed in the last year and 69% expect them to change again in 2015.

As a result, more than one in four respondents are reassessing their security needs quarterly and another 31% are doing so annually.

The growing use of mobile and personal devices to access corporate systems has expanded the security perimeter beyond the range corporates can control, the report states. But while 96% of respondents’ companies allow remote access to their systems, only 69% have formal BYOD policies.

Report author Ari Kaplan said the results show that security specialists are making an increasing effort to balance breach prevention with post-breach remediation.

“We also noted increasing collaboration between security specialists and data owners, and a growing tension between enhancing productivity and strengthening security.”

In line with this, 23% of respondents report collaborating with data custodians to ensure sensitive data is stored securely on a daily basis. The majority (54%) engage in such collaborations at least monthly.

“This report confirms and clarifies what we’ve been hearing in the marketplace, that information security is undergoing a profound change and entering a new phase,” added Dr Jum Kent, Nuix global head of investigations and cybersecurity.

“We’ll be very interested to see how this transformation works its way through the business community as we repeat this benchmarking survey next year and into the future.”

Image courtesy of 世書 名付 under CC

Related Articles

Delayed detection is turning cyber incidents into million‍-‍dollar losses

Despite record spending on cybersecurity, the volume of successful breaches continues to rise.

AI adoption is accelerating, but is cybersecurity keeping up?

Today, AI tools are being adopted faster than most organisations can secure them.

Harvest now, decrypt later: why your encrypted data has an expiry date

Quantum communications represent a rare type of disruption: one that is both predictable and...


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd