SURVEY #1: NETWORK SECURITY
SUMMARY ANALYSIS

Purpose
Summary of Findings
Findings
Demographics Section
The Survey Questionnaire

The Survey

An online panel of 1,509 members was recruited in January-March of 1998 for the World Research MIS Panel. Various means were used, including online banners, newsletter sponsorships and email campaigns.

The first survey was sent to these panelists on March 24. The subject was NETWORK SECURITY.

584 panelists (39%) filled out all or part of the survey form during the week the survey was active.

Click here to see the questionnaire.


Purpose

The survey was commissioned to determine attitudes and concerns about Network Security among IT executives and professionals.

Summary of Findings

  • Compliance with network security policies is spotty, on the whole.
  • The majority would prefer to enforce security transparently, and also to try to customize the security policy to the company.
    • There is also interest in restricting activities that give too much access, but those activities don't include web access.
  • Most respondents are not very concerned about the danger of firewall bypass.
  • Where a firewall exists, the remaining danger mostly comes from human factors such as employee disaffection, incompetence, and access to secure LAN files.
    • Virus attacks continue to be a strong concern.
    • There is only average concern about intranet and dialup attacks.
    • Browser-, email-related and physical attacks, employee web accesses, outside hackers and exotic bandwidth attacks are a minimal concern.
    • There is NO concern about e-commerce and other Internet services.
  • Usage Control: The respondents want to get to the "needle in a haystack" isolating specific instances of misuse in volumes of usage data. And they want to do it in real time, with a combined desktop security and usage control product.
    • Again, employee web access and email are NOT concerns. Neither is fancy presentation.
  • The core concern about unrestricted web access is not the access itself, but what it could open up the company to.
    • There is a concern about the cost to the company of this kind of access, but little about the content itself.
  • Interest in the subject, and satisfaction with this survey, were evident in the extremely low opt-out figures, and the very high level of opt-in requests for information from the survey sponsor.

Findings

  1. Would you say your network security policies are followed by...
    1. There is definitely leakage here.
      1. Only 23% report complete or near-complete compliance.
      2. Adding "most users" and "half of the users", we have a majority of 60% of responses. Spotty compliance is the rule.
      3. For 22%, there is little or no compliance.
    2. Amazingly, only 1% of respondents preferred not to report their company’s state of compliance. An amazing level of trust!

  2. ...how effective would these be in an overall program of achieving adequately secure operations
  3. Ranked by Mean Response

    Effective in helping to achieve secure operations

    Mean

    Median

    Pct 5’s

    Aiming for user transparency wherever possible

    3.8

    4.0

    35

    Customizing the policy to the company

    3.7

    4.0

    21

    Restricting activities that give employees too much access

    3.6

    4.0

    25

    Operating an effective security education program

    3.5

    4.0

    19

    Documenting and communicating a security policy

    3.5

    3.0

    18

    Investing in audit and surveillance PRODUCTS

    3.4

    3.0

    13

    Enforcing stiff penalties for non-compliance

    3.2

    3.0

    21

    Investing in audit and surveillance SERVICES

    3.0

    3.0

    10

    Putting aside security where the activity isn't mission-critical

    2.5

    3.0

    7



  4. ...how concerned are you about traditional firewalls not protecting from inside attacks such as through the desktop?
    1. While there is concern (76% of respondents rated the issue a "3" or greater),
    2. only 19% were "extremely concerned",
    3. and the average is low at 3.4.
    • Inside attacks are not a hot button.

     

  5. Let's say a company has already implemented a proper firewall on its web gateway. Which of these would still be a risk to that company?
    1. It's clear that employee failings rank highest in concern here. The panelists are most concerned about employees being:
      1. disgruntled (#1 at 85%),
      2. incompetent (76%),
      3. able to get to confidential LAN files (75%.)
    2. Also high: Virus concerns (82%.)
    3. Middling concerns:
      1. Attacks through dialup connections (70%)
      2. Criminal hackers (crackers)
      3. Intranet attacks.
    4. Low concerns:
      1. Browser-based (Java/ActiveX/Cookies) (63%)
      2. Email-based (62%/53%)
      3. Physical Attacks (56%)
      4. Inappropriate employee web accesses (55%) (!)
      5. Outside hackers (55%)
      6. Exotic attacks such as broadcast storms, ICMP, UDP etc. (50%)
    5. Contrary to media reports about e-commerce security concerns, this group is just not concerned about Internet Services (38%) and Web-based financial transactions (33%.)

  6. please rate these features in a usage monitoring product:
  7. Ranked by Mean Response

    Desired features in a usage monitoring product

    Mean

    Median

    Pct 5’s

    Zeroing in on instances of misuse in large volumes of data

    3.8

    4.0

    30

    Real-time responses to misuse

    3.8

    4.0

    34

    Getting both usage control and desktop security in a single product

    3.7

    4.0

    26

    Getting accurate data on what employees are actually accessing on the web

    3.5

    4.0

    27

    Getting great reports, charts and graphs showing types of accesses

    3.2

    3.0

    18

    Curtailing personal web accesses while allowing productive work

    3.1

    3.0

    18

    Curtailing inappropriate email usage

    2.8

    3.0

    11



    1. There is keen interest in being able to "mine" the reams of access data for the specific instances of misuse. These managers know how difficult it is to find those exceptions.
    2. Being able to operate in real-time is considered important.
    3. There is also strong demand for combining desktop security and usage control.
    4. Again, employee web access and email are NOT concerns. Neither is fancy presentation.

  8. please rate these dangers in unrestricted web access:
  9. Ranked by Mean Response

     

    Dangers in unrestricted web access

    Mean

    Median

    Pct 5’s

    Opening up the company to more serious security violations

    4.1

    4.0

    46

    Waste of company time and money

    3.6

    4.0

    32

    Secondary exposure of employees to sex, hate, abuse materials

    3.2

    3.0

    21

    Potential public disclosure of what employees are surfing

    3.2

    3.0

    21

    Morale and discipline problems

    3.1

    3.0

    16



    1. The core concern about unrestricted web access is not the access itself, but what it could open up the company to.
    2. This is a hot direction, worth more investigation.

    3. There is a concern about the cost of this kind of access.
    4. Concerns relating to the material itself are minimal.
  10. Opt-in/Opt-Out Data:
    1. (Pre-checked Question): I would like to receive an executive summary of the results of this survey from the survey's sponsor:
      1. Yes: 94%
    2. (Unchecked Question): I would like to be contacted by the sponsor about a solution or answer to the types of problems discussed in the interview.
      1. Yes: 19%
    3. Panel Loss Factors from this survey:
      1. Bad email addresses: 61 (4% of panel)
      2. Remove Requests: 22 (1.5% of panel)

Demographics Section

  • Being calculated at this time. Please ensure you have joined the panel at www.survey.com/mispanel.html, to receive updated demographics.

(Panel profiles acquired in initial recruitment phase showed a broad cross-section of IT execs and professionals, from a wide range of organizations.)


Analysis
R. Eckelberry, VP Marketing
NetVersant Technologies, Inc.

Research Firm Contact
World Research, Inc.
Michael Bach (408) 323-9240
Email: Michael@survey.com

Sponsor Contact
NetVersant Technologies, Inc.
Anton Wurr
Email: netvital@netversant.com

Agency Contact
Independent Marketing
Pamela Jacques (626) 821-1885
Email: pajacques@earthlink.net 

MAINCURRENT SURVEYJOIN PANELGET UPDATES
FEEDBACKTHE SOLUTIONRELATED STORIESABOUTARCHIVE
Copyright ã 1998 NetVersant Technologies, Inc.