Microsoft Exchange Server Exploit response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Survey Reveals APAC Organisations Struggle to Cope With Evolving Quantity and Complexity of Cybersecurity Technologies

‘Detect and respond’ approach to cybersecurity widely adopted in the region, yet data breaches have cost 30 per cent of APAC organisations over US$100,000 in the current financial year

Palo Alto Networks APAC Jul 19, 2017 at 08:00 AM

 

SINGAPORE – 19 July 2017 – Difficulty keeping up with rapidly evolving cybersecurity technologies, products and solutions is the primary barrier hindering Asia-Pacific organisations from ensuring secure cyber environments. This is according to 46 per cent of respondents across the Asia-Pacific region surveyed by Palo Alto Networks for its report, ‘The State of Cybersecurity in Asia-Pacific’, launched today.

The struggle to combat increasingly sophisticated cyberthreats and the search for appropriate solutions to address them have been underscored by the following observations based on the survey results:

  • More money does not mean more and better solutions: Amongst the spectrum of cybersecurity offerings available, antivirus (69 per cent) and firewalls (67 per cent) have the highest take-up rates in the region. On the other hand, far fewer companies have adopted more advanced solutions, such as two-factor authentication (27 per cent), anti-ransomware (25 per cent) and biometrics (22 per cent). This is despite two-thirds of APAC organisations having increased cybersecurity budgets from last year, with up to 74 per cent getting sizeable budgets (5 to 15 per cent of total IT spend) dedicated to cybersecurity.
  • There is a need to change the mindset towards cybersecurity: A majority of organisations in APAC (58 per cent) believe a ‘detect and respond’ approach is more important than prevention. However, this mindset towards cybersecurity might require re-evaluation, given the continued prevalence of data breaches in the region. In financial year 2016-17, 52 per cent of organisations have reported a cybersecurity breach. Furthermore, 30 per cent have reported financial losses of over US$100,000 from those breaches.
  • Different markets face different challenges: Organisations in each market noted a range of challenges they faced in ensuring cybersecurity. Overall, the APAC markets surveyed were unanimous about employees’ lack of cybersecurity awareness being the topmost challenge. Risk from third-party vendors was the second most prominent concern (36 per cent). With the rapid adoption of digital technologies – especially in developing markets – migration to cloud followed as the third-biggest pain point (31 per cent). In particular, governments displayed a need to be more agile in adapting to technology trends, with updating legacy IT systems being their largest hurdle.

QUOTE

  • ‘Cyberthreats are not problems you can solve simply by increasing budgets. A good approach to cybersecurity requires the buy-in of business leaders and understanding of the threat landscape so they can help design and implement more effective cybersecurity policies in order to prevent breaches. Besides ensuring that networks are adequately secured with a next-generation breach prevention-minded platform approach, organisations must also ensure that employee education is elevated to the top of their cybersecurity agenda.’

    - Sean Duca, vice president and regional chief security officer for Asia-Pacific, Palo Alto Networks

Learn More

  • ‘The State of Cybersecurity in Asia-Pacific’ report features analysis, practical strategies and tips that can be implemented to help companies in Asia-Pacific keep up with rapidly evolving cybersecurity technologies.

Note to Editors

The survey was conducted amongst more than 500 business professionals in APAC, covering Australia, China, Hong Kong, India and Singapore markets.

###

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world.

Media contacts:
Martina Schulze-Warnecke
Senior Manager, Corporate Communications, Asia Pacific & Japan, Palo Alto Networks
+65 9295 9707
mswarnecke@paloaltonetworks.com

Neil Mirano
Rice Communications on behalf of Palo Alto Networks
+65 9838 4609
paloaltonetworks@ricecomms.com


Related Resources

Article

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
September 2, 2020

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
September 2, 2020

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s latest buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
November 11, 2020

White Paper

How SOAR is transforming threat intelligence

This white paper talks about how we need to transform threat intelligence by integrating it into an extensible SOAR platform enabling analysts to take full control over their threat intelligence combined with the power of proven SOAR capabilities.
March 30, 2020

Article

What Is a Site-to-Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network.
April 6, 2021

Article

What is an Endpoint?

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.
November 10, 2020

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.