Home » Computer & Software » Hardware » Soha Systems– Survey Reveals Only Two Percent of IT Experts Consider Third-Party Secure Access a Top Priority, Despite the Growing Number of Security Threats Linked to Supplier and Contractor Access
Ihren XING-Kontakten zeigen

Soha Systems– Survey Reveals Only Two Percent of IT Experts Consider Third-Party Secure Access a Top Priority, Despite the Growing Number of Security Threats Linked to Supplier and Contractor Access

SUNNYVALE, CA — (Marketwired) — 05/17/16 — , an innovator of enterprise access as a service, today released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group; Akamai; Assurant, Inc.; BrightPoint Security; CKure Consulting; Hunt Business Intelligence, PwC; and Symantec. The report, which surveyed over 200 IT and security C-Level executives, directors and managers at enterprise-level companies, revealed four key insights:

Third-party access is not an IT priority, yet it is a major source of data breaches

Respondents believe their own organizations are secure from third-party data breaches but think their competitors are vulnerable to them

Providing third-party access is complex and tedious, and has many moving parts

IT professionals take data breaches personally but are not worried about losing their jobs due to a breach

While third parties cause or are implicated in 63 percent of all data breaches(1), a disproportionately small 2 percent of respondents consider third-party access their top priority in terms of IT initiatives and budget allocation. While they do not see it as a priority, enabling third-party access is an ongoing challenge; 75 percent of respondents said it requires them to touch numerous network and application hardware and software components.

“The results of our survey highlight the disconnect between IT priorities and the urgent need to mitigate third-party data breaches,” said Mark Carrizosa, chief information security officer and vice president of security at Soha Systems. “The survey shows enterprises have vastly underestimated the resources required to deal with such breaches, even as their need to provide secure third-party access continue to grow.”

Even with all of the recent third-party breaches involving such notable brand names as , , and , the survey reveals IT executives continue to believe that security breaches are something that happen to competitors– organizations, not theirs. While 62 percent of respondents do not expect their organization to be the target of a serious data breach due to third-party access, 79 percent expect their competitors will suffer a serious data breach in the future. And while the respondents did not believe their organizations were vulnerable to an attack through third parties, 56 percent had strong concerns about their ability to control and/or secure their own third-party access.

“For business reasons, organizations are increasingly providing third parties with access to their IT infrastructure, but IT and security leaders really need to help their business leaders understand the risks of third-party access and take steps to help manage these risks to an acceptable level,” said Derek Brink, vice president and research fellow at Aberdeen Group. “The Advisory Group put together by Soha aims to contribute to this important problem by developing a set of best practices and recommendations to be shared later this year.”

In addition to not making third-party access security a priority, most of those polled felt that providing third-party access was a complex and tedious process. The survey revealed the following issues:

IT needs to touch 5 to 14 network and application hardware and software components to provide third-party access.

According to 55 percent of respondents, providing third-party access to new supply-chain partners or others was a “Complex IT Project” and, on average, they have to touch 4.6 devices, such as VPN, firewalls, directories and more. Forty percent described the process as tedious or painful, and 48 percent described it as an ongoing annoyance.

Third-party access is not something that will go away; 48 percent of respondents saw third-party access grow over the past three years, and 40 percent said they see growth continuing over the next three years.

“In a world of applications spread across public and private clouds and accessed by external users who are not your employees using devices you do not manage, providing secure third-party access is a very difficult problem,” said Nico Popp, senior vice president, information protection at Symantec. “It takes a long time for IT to work through the moving parts. In fact, the lack of centralized control makes it virtually impossible for IT to govern and secure third-party access today.”

The survey also asked IT professionals, “If a data breach occurred in your area of responsibility, would you feel personally responsible?” Interestingly, 53 percent of respondents said they would because they felt it would reflect poorly on their job performance; however, only 8 percent thought they might lose their job if a data breach occurred during their watch. IT professionals take their jobs seriously. But it is unclear who is held accountable for data breaches and how this ambiguity might affect attitudes and behavior when it comes to ensuring that organizations are safe from outside threats.

As the survey data clearly shows, the divide between IT priorities and the need to mitigate third-party data breaches is a serious problem that affects all industry segments. To help determine why this has been such ongoing problem, Soha formed the Advisory Group to act as a conduit for ongoing research — including this most recent IT survey — and to establish future guides for ongoing best-practice recommendations on the topic of third-party access.

The Advisory Group features a number of security professionals, analysts and industry influencers, including the group–s chairman, Mark Carrizosa. Mark is Soha–s chief information security officer and vice president of security; he joined Soha in 2015 from Walmart, where, as principal security architect, he developed and implemented the company–s global e-commerce security architecture framework. Prior to Walmart, Mark was operational risk consultant at Wells Fargo, where he analyzed the company–s infrastructure and application compliance to improve the security risk posture of both customer-facing and internal systems.

Additional advisory group members include Derek Brink, vice president and research fellow at Aberdeen Group; Andy Champagne, vice president and chief technology officer (CTO) at Akamai Labs; Steve Hunt, principal consultant at Hunt Business Intelligence; Slava Kavsan, founder and CEO at CKure Consulting; Mike Kotnour, senior information security advisor at Assurant Solutions, a business segment of Assurant, Inc.; Shahed Latifprincipal in the cybersecurity and privacy practice at PwC; Ajay Nigam, senior vice president products at BrightPoint Security; and Nico Popp, senior vice president, information protection, at Symantec. The group–s next survey and recommendations are scheduled for Fall 2016.

Data was collected in April 2016 from an online survey of over 200 enterprise IT and security C-level executives, directors and managers at enterprise-level companies to understand the role third-party access plays in the enterprise and its importance. The survey consisted of 17 questions that required single and/or multiple-choice answers. All responses were anonymous.

The full report can be downloaded from:

Soha Systems, named a “Cool Vendor” in “Cloud and Emerging Technology Security, 2016” report by Gartner, Inc., is an innovator of enterprise access as a service for third parties, including suppliers, contractors and franchisees. The service, Soha Cloud, provides a painless, convenient, secure and centralized controlled approach to third party access that does not require device specific software or direct access to the network. The Soha Cloud service, compliant with PCI DSS 3.1, can be deployed in minutes for third party access to corporate applications in data centers and hybrid cloud environments. For more information, visit and join the conversation on Twitter @SohaSystems.

(1)https://www.trustwave.com/Resources/Library/Documents/2013-Trustwave-Global-Security-Report/

Image Available:

Rick Popko
10Fold
415-800-5381

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop