Home Applications Citrix: Surveys Show Businesses Need to Shift Away from Protecting Devices and Focus on Securing Apps and Data In All Stages

Citrix: Surveys Show Businesses Need to Shift Away from Protecting Devices and Focus on Securing Apps and Data In All Stages

0
Citrix: Surveys Show Businesses Need to Shift Away from Protecting Devices and Focus on Securing Apps and Data In All Stages
0

As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. A recent Citrix Qualtrics survey shows that more companies are moving away from device-centric, platform-specific endpoint security technologies toward an approach that secures their applications and data everywhere. The survey revealed that:

  • More than half of Citrix customers reported that they are changing the way their SecOps teams are operated because of the increase in ransomware, targeted malware and phishing attacks.
  • Just over 48 percent said that end-to-end protection of applications and data was most important to protecting their always-on business.
  • And 56 percent are looking more closely at how to simplify management and monitoring of SSL certificates.

In addition to the Citrix survey, a July 2016 Forrester Security Business Technographics report fielded between March-May, 2016, found that:

  • 62 percent of security decision makers report that they would like to accelerate their digital business in the next twelve months.
  • And 65 percent say they would like to improve application security capabilities and services.
  • 47 percent say they’re implementing or expanding IoT security in the next 12 months, but 30 percent are challenged by privacy concerns.
  • 20 percent are challenged by the compromise of sensitive data.

Physical assets are disposable. The secure delivery of apps and data is critical for business to ensure the safety of their sensitive information. As more organizations embrace the digital transformation of their business and face challenges presented by emerging trends such as cloud, IoT and analytics, they will need to shift thinking away from protecting each device to securing sensitive applications and data.

Business is Always On. Security Cannot Stand in the Way.

Security fears from the increase in targeted business attacks are changing the way companies conduct business. Devices are accessing information all the time – over public networks, across geographic boundaries and from the cloud – requiring IT to rethink their security and compliance approach. In fact, sixty four percent of Citrix customers reported that their top priority as they move more data to a cloud environment is policy enforcement to meet compliance regulations.

Businesses want to adopt new technology, but are still stuck catching up on compliance regulations. By shifting away from device-level, platform-specific endpoint security solutions, businesses can more easily achieve compliance and focus on adopting new technology to improve employee productivity and reduce risk to sensitive business information.

Security is vital to our organization as every day our employees deal with sensitive data belonging to local citizens. By relying on companies like Citrix, our IT team is able to keep this propriety information safe regardless of the device or location. The reassurance that our data will not be compromised also allows our employees to focus instead on the most important piece of their job – helping serve, protect and build a robust relationship with the community.

– Ashish Kakkad, CIO at San Diego County Sheriff’s Dept

With emerging technologies like cloud, mobile, analytics and IoT, we don’t have the luxury of controlling each device that an employee brings to work or tries to use to access data. Business doesn’t stop, and it’s not centralized to one location. Our people need access, and we need to know that no matter where they are, what time of day it is, or the device they’re using, our data and our customer’s data is protected. We use Citrix technology to do that.

– John Brister, IT Director at Franciscan Missionaries of Our Lady Health System

With Citrix, organizations can provide the right level of confidentiality, integrity and availability for data without placing undue restrictions on the ways people work. Across every industry, including the most highly-regulated sectors, customers rely on Citrix to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.

Stop by Citrix booth no. 324 at Black Hat Last Vegas next week to learn more about how Citrix is helping solve specific security business challenges. Attend our session, “TLS is No Longer Optional” on Thursday, August 4 in theatre A from 2:30 – 3:15 pm PT. Follow us on Twitter to hear about our daily booth giveaways!

Survey Methodology

The Citrix Qualtrics network security survey was conducted in July 2016. The U.S. survey included IT managers, network administrators and executives.

The Forrester Global Security Survey, 2016 was fielded in March-May, 2016. This online survey included 3,588 respondents in Australia, Brazil, Canada, China, France, Germany, India, New Zealand, the U.K. and the U.S.

Categories:
Citrix Systems Citrix (NASDAQ:CTXS) aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premise and across any device or platform. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use by more than 400,000 organizations and over 100 million users globally. Learn more at www.citrix.com.

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close