To Patch, or Not to Patch? (Not If, But How) Building on the findings and analysis published in Managing Vulnerabilities and Threats: No, Anti-Virus is Not Enough (December 2010) and Is Your Vulnerability Management Program Leaving You at Risk? Most Likely, Yes (June 2011), Aberdeen focuses in specifically on patch management – based on trends in its adoption as identified in seven independent benchmark studies over a period of four years. The analysis confirms the general correlation: higher adoption of patch management corresponds to a lower percentage of accepted risks. This makes sense: if you don't patch at all, you effectively accept all the risk; but even if patching is 100%, some residual risks remain. On the critical question of how to patch, which is the better strategy: to prioritize patching for the most critical systems and/or for the patches that would provide the greatest good for the greatest number of systems? – Or alternatively, to adopt the simpler policy of patching everything? October 2011 Analyst Insight Aberdeen’s Analyst Insights provide the analyst perspective of the research as drawn from an aggregated view of surveys, interviews, analysis and experience. Business Context: Focusing in on Patch Management This Analyst Insight is the third in a series focusing on how a global sample of more than 160 organizations manages the never-ending vulnerabilities and threats that assault their enterprise endpoints: In Managing Vulnerabilities and Threats: No, Anti-Virus is Not Enough (December 2010), Aberdeen noted that the top performers excel at managing vulnerabilities and threats across their entire lifecycle, from assessment to prioritization to successful remediation. Their focus on maximizing efficiency and minimizing total cost also acknowledges the unfortunate but critical necessity of adopting a continuous approach to vulnerability management – and highlights the value of solutions that increase visibility and provide actionable intelligence for remediation. In Is Your Vulnerability Management Program Leaving You at Risk? Most Likely, Yes (June 2011), Aberdeen noted that executive management generally understands the importance of vulnerability management initiatives as part of their overall risk management strategies, but further analysis showed that in spite of their expenditures they may actually be ignoring (and therefore accepting) as much as 80-90% of their endpoint security-related risk – e.g., in the case of adopting a Microsoft-only approach. Given that companies are compelled to invest in managing these unrewarded risks anyway, their best interests are clearly to do it as efficiently and as effectively as possible – which highlights the importance of taking a multiplatform, multi-application approach. Definitions For the purposes of this report: Unrewarded risk refers to threats, vulnerabilities and regulatory compliance, and the corresponding investments that companies are compelled to make to deal with them. Characteristics include protecting value, defense, and minimizing downside. Rewarded risk refers to projects and initiatives which are undertaken with an objective of innovation and growth. Characteristics include creating value, enablement, and maximizing upside. This document is the result of primary research performed by Aberdeen Group. Aberdeen Group's methodologies provide for objective fact-based research and represent the best analysis available at the time of publication. Unless otherwise noted, the entire contents of this publication are copyrighted by Aberdeen Group, Inc. and may not be reproduced, distributed, archived, or transmitted in any form or by any means without prior written consent by Aberdeen Group, Inc. To Patch, or Not to Patch? (Not If, But How) Page 2 In this report, Aberdeen focuses in specifically on patch management – including historical trends in its adoption as identified over four years and seven independent benchmark studies, and differences in adoption by the leading performers in comparison to the lagging performers across the same span of research. But most importantly, Aberdeen explores the correlation between current use of patch management and the level of endpoint-related risk that companies are effectively accepting. This leads directly to the strategic question which is behind the title of this Analyst Insight: to patch, or not to patch? Aberdeen's research confirms that the right question is not if, but how. Aberdeen's Research Findings on Patch Management In the execution of its unique benchmarking style of market research, Aberdeen routinely asks a global demographic of enterprises about selected IT Security-related technologies: their current use, their planned use in the next 12 months, and their current evaluations. Of course, the foundation of Aberdeen's research methodology is that the adoption of enabling technologies for security and compliance is necessary for top performance, but not sufficient – that is, it also requires essential policy, planning, process and organizational elements of implementation, which are critical success factors in an enterprise's ability to maximize business value. For now, however, we focus on trends in adoption for patch management solutions. Definition For the purposes of this report, patch management refers to the technologies and processes used to identify, prioritize and remediate the vulnerabilities that put an organization's IT infrastructure at risk: Identification of the vulnerabilities and threats that are relevant to the organization's IT assets Determination of which vulnerabilities and threats should be addressed first, based on the level of risk and the business value of the IT assets in question Remediation of the vulnerabilities through deployment of software patches (or configuration changes, or other compensating controls) Historical Trends in Patch Management (2007-2011) Over four years and seven independent benchmark studies in which Aberdeen asked questions about the adoption of patch management, the research shows very little variation in terms of its current use. On average, about three-fourths (75%) of all respondents consistently indicate that patch management is currently deployed within their organizations (Figure 1). Percentage of Respondents Figure 1: Current Use of Patch Management (All Respondents) 100% All Respondents 85% 75% 74% 70% Sep-07 Jul-08 75% 75% 74% 72% 75% 50% 25% 0% Mar-09 Nov-09 Feb-10 Nov-10 May-11 Average Date of Aberdeen Study Source: Aberdeen Group, October 2011 © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 3 But one-dimensional survey results such as these are widely available. A unique aspect of Aberdeen's methodology is that it defines a maturity class framework which sorts all respondents into a sort of normal distribution, i.e., all enterprises within each study fall into one of the following three levels of practices and performance: Best-in-Class (top 20%) – practices that are the best currently being employed and result in the top industry performance, Industry Average (middle 50%) – practices that represent the average or norm for the study, and result in average industry performance, and Laggards (bottom 30%) – practices that are significantly behind the rest of the industry, and result in below average performance. The historical trends in patch management across multiple benchmark studies are fairly consistent in terms of current adoption by maturity class as well. On average, patch management is currently deployed by about 70% of Laggards, by about 75% of the Industry Average and by about 90% of the Best-inClass (Figure 2). Figure 2: Current Use of Patch Management (by Maturity Class) Actual security-related incidents experienced (e.g., number, year-over-year change) Audit deficiencies related to security or compliance experienced (e.g., number, year-over-year change) Annual costs related to the initiative under study Companies with top performance based on the selected criteria earn "Best-inClass" status. 69% 76% 64% To distinguish Best-in-Class companies (top 20%) from Industry Average (middle 50%) and Laggard organizations (bottom 30%) in aspects of IT Security and IT GRC, Aberdeen generally uses aspects of the following: Full details of the criteria used are provided in each respective benchmark study. 87% 93% 77% 71% 86% Laggards 76% 79% 88% 71% 86% 66% 64% 50% 76% 88% 67% 80% 74% Percentage of Respondents 75% Industry Average 85% Best-in-Class 100% Determining the Best-in-Class 25% 0% Sep-07 Jul-08 Mar-09 Nov-09 Feb-10 Date of Aberdeen Study Nov-10 Average Source: Aberdeen Group, October 2011 To be sure, this analysis shows that the leading performers are consistently more likely than the lagging performers to have current deployments of patch management – but the question is, how strong is the correlation between current adoption and the achievement of top results? One way that Aberdeen sometimes uses to tease out this information is to compare the following: The absolute adoption by the top performers (i.e., the percentage of the Best-in-Class indicating current use, which is represented by the height of the dark blue bars in Figure 2), with © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 4 The relative adoption by the leaders in comparison to the laggards (i.e., current use by the Best-in-Class divided by current use by Laggards, or the ratio of the blue bars to the red bars in Figure 2). The result shows that for the past four years, patch management has been squarely in the baseline quadrant – i.e., high adoption by the leading performers, as well as relatively high adoption by everyone else (Figure 3). Baseline technologies are widely viewed as foundational for success, although taken by themselves they do not differentiate top performance. Relative Adoption (ratio of adoption by the leaders compared to that of laggards) Figure 3: Current Use of Patch Management by Top Performers (Absolute Adoption vs. Adoption Relative to Lagging Performers) 2.0 Early Adoption Differentiators Date of Study Average 1.5 Oct 2010 Mar 2008 New / Emerging 1.0 0% Average Mar 2009 Sep 2007 Feb 2010 Nov 2009 Baseline 50% 100% Definitions For this Analyst Insight: Baseline refers to high adoption by the leading performers, as well as relatively high adoption by all others. Baseline technologies are widely viewed as foundational for success, although taken by themselves they do not differentiate top performance. Emerging refers to modest adoption by the leading performers, and relatively low adoption by all others. Early Adoption refers to modest adoption by the leading performers, but high adoption by the leaders relative to that of all others. Differentiators refers to high adoption by the leading performers, and high adoption by the leaders relative to that of all others. Absolute Adoption (% of leading performers indicating current use) Source: Aberdeen Group, October 2011 Latest Snapshot in Patch Management (May 2011) Aberdeen's most recent study that included questions about patch management – the Q1 2011 Aberdeen Business Review (May 2011) – provides the basis to explore differences in current use, planned use in the next 12 months, and current evaluations by company size and geographic region. As shown in Figure 4, current use of patch management is strongly correlated with company size. Nearly 100% of Large enterprises have already deployed patch management, or plan to do so within the next year. For Small businesses, however, just 3 out of 5 (59%) indicate current use. But planned use and current evaluations among Small businesses are both relatively high, which can reasonably be taken as a proxy for market interest and near-term growth. This is not terribly surprising, given the steady drumbeat of headlines about publicly disclosed breaches – even smaller businesses are becoming more aware of the compelling need to address the vulnerabilities and threats to their endpoints. © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 5 Percentage of Respondents (N=139) Figure 4: Latest Snapshot in Patch Management (May 2011) – Current Use, Planned Use, Evaluations (by Company Revenue) 100% 75% 9% 8% 14% 9% 5% 8% 50% 72% 25% 59% 76% 2% 6% 92% Definitions The following terms are defined by an organization's revenue in the most recent 12month reporting period: Large: $1B or higher 0% All Respondents Small (<$50M) Midsize Large (>$1B) Mid-Size: less than $1B and more than $50M Small: $50M or lower Current Planned < 12 Months Evaluating Source: Aberdeen Group, October 2011 A similar analysis, based on the geographic region of the respondents' headquarters, is presented in Figure 5. Current use of patch management is strongest in the Asia/Pacific region, while planned use and evaluations indicate a sharply increasing focus on endpoint-related vulnerabilities and threats in the Americas and EMEA. Percentage of Respondents (N=139) Figure 5: Latest Snapshot in Patch Management (May 2011) – Current Use, Planned Use, Evaluations (by Geographic Region) 100% 75% 9% 8% 11% 9% 5% 13% 72% 69% 71% 50% 25% 3% 7% 86% 0% Worldwide Americas EMEA Asia/Pacific Definitions The following terms are defined by the geographic location of the firm's headquarters: Americas: North, South and Central America EMEA: Europe, the Middle East, and Africa Asia / Pacific: all others Current Planned < 12 Months Evaluating Source: Aberdeen Group, October 2011 © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 6 Insight: Correlating Patching (If, and How) with Risk Let's review what has been established about patch management so far, based on a focused review of Aberdeen's benchmark research over the last four years: On average, about three-fourths (75%) of all companies have current deployments of patch management This overall percentage shows very little variation over seven studies over the last four years The leading performers are consistently more likely than the lagging performers to have current deployments of patch management But analysis shows that while current use of patch management is foundational for success, taken by itself this does not differentiate top performance Current use of patch management is strongly correlated with company size – nearly all of Large enterprises, in comparison to just 3 out of 5 Small businesses But planned use and current evaluations among Small businesses are both relatively high, indicating solid market interest and near-term growth By geographic region, current use of patch management is strongest in the Asia/Pacific region Meanwhile planned use and current evaluations indicate a sharply increasing focus on endpoint-related vulnerabilities and threats in the Americas and EMEA If You Patch Means You are Accepting Less Endpoint Risk In Is Your Vulnerability Management Program Leaving You at Risk? Most Likely, Yes (June 2011), Aberdeen noted that because there is no such thing as "perfect" security – that is, one could invest an infinite amount on prevention, and yet an incident may still occur – one should think about whether the ratio of "total annual cost of my IT Security initiatives" versus "total annual cost of IT Security-related incidents that were not avoided, in spite of my investments" reflects an acceptable balance. Each organization's decisions about optimizing the tradeoffs between higher or lower annual investments in patch management initiatives, versus the additional costs of endpoint-related incidents avoided or not avoided, is the very essence of a risk-based approach. As summarized in Table 1, the percentage of risk which the companies in Aberdeen's study are effectively ignoring or accepting – above and beyond their current investments – is on average about 60%, but ranging as high as 78%. © 2011 Aberdeen Group. www.aberdeen.com Definitions For the purposes of evaluating the business value of enterprise investments in patch management initiatives, Aberdeen uses the following simple equation: Total annual cost of incidents that were successfully avoided by patching divided by Total annual cost of patching, plus the total annual cost of incidents that were not avoided The denominator includes the total annual cost for the organization's patch management initiatives; also in the denominator, however, are the total costs from incidents that were not avoided in the last 12 months, in spite of the investments in patching that have been made. In the numerator are the best estimates for the total costs of incidents that were avoided in the last 12 months as a result of the organization's investments in patching – these may be difficult to come by, however, and imprecise at best. For this reason, the most general way to think about this simple framework is that any investments in technologies and services that lower the total annual cost of the initiative (efficiency) and cause a greater shift from the denominator to the numerator in terms of incidents avoided (effectiveness) will have a strongly positive impact on the overall return on annual investment. Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 7 Table 1: IT Security Investments Overall Accept About 60% of Risks; Variations by Size, Region Annual Averages All Large Mid-Size Small Americas EMEA Asia/Pac Total annual cost of initiatives + Total costs not avoided (as a % of annual revenue) 0.2% 0.1% 0.6% 3.8% 0.2% 0.2% 0.2% Total annual cost of initiatives + Total costs not avoided (as $ per employee per year) $220 $140 $590 $1,200 $230 $170 $250 Ratio of total costs not avoided to total annual cost of initiatives 1.47 0.64 2.00 3.57 1.35 1.59 2.74 Percentage* of risk which companies effectively ignore or accept, above and beyond their current investments 60% 39% 67% 78% 57% 61% 73% * Calculated as (Total Cost of Incidents Not Avoided) / ((Total Annual Cost of Initiatives) + (Total Cost of Inciden ts Not Avoided)) Source: Aberdeen Group, June 2011 To see if there is a correlation between the research findings on the latest trends in deployment of patch management, and the analysis showing the level of risk which companies effectively ignore or accept, Aberdeen created a simple x-y graph (Figure 6). By inspection, we can see the general correlation: higher adoption of patch management corresponds to a lower percentage of accepted risks. This makes sense: if you don't patch at all, you effectively accept all the risk. If patching is 100%, some residual risks remain. Figure 6: Adoption of Patch Management Generally Correlates with Lower Percentage of Risks Effectively Accepted or Ignored Percentage of Risks Effectively Accepted or Ignored, Above and Beyond Current Investments Case in Point: RSA Breach 100% Average Company Size Region 50% 0% 50% 75% 100% Current Use of Patch Management Source: Aberdeen Group, October 2011 © 2011 Aberdeen Group. www.aberdeen.com "In our case the attacker sent two different phishing emails over a two-day period. The email subject line read 2011 Recruitment Plan. This was intriguing enough for one of the employees to actually pull the email out of their Junk Box and double-click on the email attachment. The spreadsheet contained a zero-day exploit that installs a backdoor through Adobe Flash vulnerability (CVE2011-0609)." ~ Uri Rivner, Head of New Technologies, Consumer Identity Protection for RSA, The Security Division of EMC Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 8 How You Patch Also Affects How You Accept Endpoint Risk This brings us at last to the critical question of how to patch: On one hand, a classic risk-based approach would be to prioritize patching for the most critical systems, and / or for the patches that would provide the greatest good for the greatest number of systems. Some companies describe a methodical cycle of scanning, prioritizing, pre-testing, patching, testing and confirming that patches are successful. "Our most critical systems are those I am not allowed to patch. They are the manufacturing systems, and I am not allowed to touch them." ~ CISO, EMEA Others argue strenuously that it is more cost-effective to simply patch everything: "It would take more of my resources to compute the vulnerability management priority index," thundered the Chief Information Security Officer of a well-known global brewer, "than it would to simply adopt the policy of patching everything." Aberdeen has written about these two distinct strategies before, for example in Full-Disk Encryption On the Rise (2009). Given the precision of encrypting only specific files or folders based on content and pre-existing policies, or the simplicity of encrypting everything on the endpoint, Aberdeen's research shows a clear trend towards the simplicity of full-disk encryption. In another example, given the simplicity of providing stronger (nonpassword) authentication technologies such as one-time passwords or smart cards for all users – or the precision of using passwords for everyone combined with context-specific challenges based on transparent risk-based scoring and heuristics – more companies go with the more precise (and lower cost) approach. A recent white paper by technical leaders at the Denmark-based solution provider Secunia (see How to Secure a Moving Target with Limited Resources, www.secunia.com) provides an excellent comparison of distinct patching strategies – with the realistic assumption of limited resources – and analyzes the tradeoffs between the risks of patching with the risks of testing. Some of their high-level conclusions: Patching is a foundational security control, as it eliminates the root cause of compromise. Analysis of two patching strategies shows that knowing what to patch pays off – they calculate that an 80% reduction in risk can be achieved by identifying and patching either the most risky applications or the most prevalent applications. An intelligent patching strategy demands a dynamic approach, given the fast-changing vulnerability and threat landscape. © 2011 Aberdeen Group. www.aberdeen.com Simplicity, or Precision? Aberdeen has previously shared an analogy which illustrates the difference between the strategy of simplicity and the strategy of precision. The story is apocryphal as it is commonly told, but no less instructive: In the Space Race between the Soviet Union and the United States in the 1960s, cosmonauts and astronauts needed a writing instrument that would work in a vacuum, in zero gravity, and in the temperature extremes of hot sunlight and cold shadow. At great expense, the Americans developed a high-tech, pressurized ball point pen – the Fisher “Space Pen” – that met these requirements. The Soviet solution: a standard graphite pencil. Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 9 Case in Point: Telecommunications Provider, EMEA A leading telecommunications provider in northern Europe supports its customers with a wide range of services, from fixed lines to mobile and data networks, Internet and security services, voice over IP, and cable services for digital television. The company was especially challenged to maintain a complete and accurate picture of its many endpoints, in particular thirdparty programs and multiple versions. Additional challenges included a lack of patching capabilities and tools to produce reports for use by senior management. After evaluating patch management solutions from Microsoft, Shavlik and others – based on factors of pricing, reputation and ease of use – the company selected a solution from Secunia. "Our results have been good, but our patching process still needs to evolve, and resources for patching still need to be better aligned," noted a company Information Security Specialist. "The reporting capabilities have also been extremely useful." Their experiences to date also confirm the intimate relationship and tradeoffs between patching and testing. "We have learned a lot about the importance of testing patches before deploying them to the production environment," says the specialist. "For example, some of our older employees really don't like it when their Firefox browser or Adobe Acrobat Reader changes language from Finnish to English without notice." Solutions Landscape (illustrative) The solutions in the Table 2 – highlighted based on their capabilities for integration of intelligence for prioritization and automated remediation – are illustrative of those that address patch management in the context of the end-to-end vulnerability management lifecycle. Table 2: Solutions Landscape for the Vulnerability Management Lifecycle (illustrative) Company Web Site Solution(s) eEye Digital Security www.eeye.com Retina Unified Vulnerability Management, Blink Endpoint Protection, Iris Network Traffic Analyzer IBM (BigFix) www.bigfix.com BigFix Asset Discovery, Patch Management, Security Configuration Management, Vulnerability Management, Anti-Virus / Anti-Malware Lumension www.lumension.com Novell www.novell.com ZENworks Configuration Management, Asset Management, Endpoint Security Management, Patch Management Secunia www.secunia.com Secunia Corporate Software Inspector, Vulnerability Intelligence Manager Shavlik www.shavlik.com Shavlik NetChk Protect, NetChk Configure, Security Intelligence Lumension Application Control, AntiVirus, Device Control, Patch and Remediation, Scan, Security Configuration Management, Risk Manager, Enterprise Reporting Source: Aberdeen Group, October 2011 © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 10 Key Takeaways and Recommendations To patch, or not to patch? Aberdeen's research and analysis shows that: On average, about three-fourths (75%) of all companies have current deployments of patch management, a percentage that shows very little variation over seven studies over the last four years The leading performers are consistently more likely than the lagging performers to have current deployments of patch management Current use of patch management is strongly correlated with company size – nearly all of Large enterprises, in comparison to just 3 out of 5 Small businesses By geographic region, current use of patch management is strongest in the Asia/Pacific region, followed by EMEA and the Americas But analysis shows that while current use of patch management is foundational for success, taken by itself it does not differentiate top performance – in other words, success is not only a question of if, but also a question of how The general correlation is clear: higher adoption of patch management corresponds to a lower percentage of accepted risks. This is common sense: if you don't patch at all, you effectively accept all the risk; but even if your patching is 100%, some residual risks will remain. On the critical question of how to patch, which is the better strategy: To prioritize patching for the most critical systems, or for the patches that would provide the greatest good for the greatest number of systems? Or alternatively, to adopt the simpler policy of patching everything? Aberdeen's direct interviews with organizations find strong proponents in both camps. Assuming resources are limited, recent analysis by industry leader Secunia demonstrates that a significant reduction in risk can be achieved by identifying and patching either the most risky or the most prevalent applications. Why Companies Don't Patch When asked about the inhibitors for current investments in patch management, "lack of a compliance driver" was the leading response. The corollary to compliance requirements as a leading driver is that lack of compliance requirements (or compliance requirements without meaningful "teeth") often translates to “defer making investments.” Surprisingly, "no valuable services are exposed" and "no valuable data is exposed” were also indentified as leading inhibitors to current investments. Given the increasing volume, variety, and sophistication of new threats and vulnerabilities, however, this finding indicates a high need for additional awareness and education about the risks and costs of ignoring, deferring, or underfunding patch management. Aberdeen's research shows that characteristics of organizations with top performance in managing vulnerabilities and threats include: A comprehensive approach – the top performers excel across the entire vulnerability management lifecycle, from assessment to prioritization to remediation. Their focus on maximizing efficiency and minimizing total cost also acknowledges the necessity of a continuous approach to vulnerability management. A multi-application approach is critical, especially since on the typical Windows-based PC there are more than 3-times more vulnerabilities in third-party applications than in all installed Microsoft programs combined. For most organizations a multi-platform approach is also important. Speed and accuracy are key solution selection criteria. © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897 To Patch, or Not to Patch? (Not If, But How) Page 11 A risk-based approach – the top performers quickly determine which vulnerabilities and threats should be addressed first, based on the level of risk and the business value of the IT assets in question. Solution selection criteria should include the visibility and intelligence that can be gleaned to provide insights, rankings, and recommended priorities for remediation. An optimized approach – the top performers tend to focus on being secure, compliant and well-managed, in that order. Wellmanaged includes both greater efficiency (i.e., lower total cost) and greater effectiveness (e.g., automation to reduce cost and reduce windows of vulnerability); this has the additional benefit of freeing up resources to focus on projects aimed at innovation and growth. For more information on this or other research topics, please visit www.aberdeen.com. Related Research Is Your Vulnerability Management Program Leaving You at Risk? (Most Likely, Yes); June 2011 Q1 2011 Aberdeen Business Review; May 2011 Managing Vulnerabilities and Threats (No, Anti-Virus is Not Enough); December 2010 The State of IT (In)Security, and How to Avoid Costs by Investing More; November 2010 National Cybersecurity Awareness Month: Anti-Virus and Personal Firewalls; October 2010 National Cybersecurity Awareness Month: Patches, Configurations and Changes; October 2010 Five Key Capabilities for Gaining Visibility and Control over Your Network Devices, Endpoints and End-Users; Sept. 2010 Securing Your Applications: Three Ways to Play; August 2010 Web Security in the Cloud; May 2010 Email Security in the Cloud; April 2010 IT Security: Balancing Enterprise Risk and Reward; January 2010 When Less is More: Why Small Companies Should Think Outside the (Red / Yellow) Box for Protecting Their Endpoints; March 2009 Secure, Compliant, and Well-Managed: The IT Security Approach to GRC; February 2009 Vulnerability Management: Assess, Prioritize, Remediate, Repeat; July 2008 Author: Derek E. Brink, Vice President and Research Fellow, IT Security (Derek.Brink@aberdeen.com) For more than two decades, Aberdeen's research has been helping corporations worldwide become Best-in-Class. Having benchmarked the performance of more than 644,000 companies, Aberdeen is uniquely positioned to provide organizations with the facts that matter — the facts that enable companies to get ahead and drive results. That's why our research is relied on by more than 2.5 million readers in over 40 countries, 90% of the Fortune 1,000, and 93% of the Technology 500. As a Harte-Hanks Company, Aberdeen’s research provides insight and analysis to the Harte-Hanks community of local, regional, national and international marketing executives. Combined, we help our customers leverage the power of insight to deliver innovative multichannel marketing programs that drive business-changing results. For additional information, visit Aberdeen http://www.aberdeen.com or call (617) 854-5200, or to learn more about Harte-Hanks, call (800) 456-9748 or go to http://www.harte-hanks.com. This document is the result of primary research performed by Aberdeen Group. Aberdeen Group's methodologies provide for objective fact-based research and represent the best analysis available at the time of publication. Unless otherwise noted, the entire contents of this publication are copyrighted by Aberdeen Group, Inc. and may not be reproduced, distributed, archived, or transmitted in any form or by any means without prior written consent by Aberdeen Group, Inc. (2011a) © 2011 Aberdeen Group. www.aberdeen.com Telephone: 617 854 5200 Fax: 617 723 7897