the PowerPoint slide. - ESG Research

Usage of Confidential Data-Related Security Measures
With respect to securing confidential data, please describe your organization’s usage of
each of the following security measures. (Percent of respondents, N=308)
Already use
Plan to do this within the next 12 months
No plans to do this but interested
Vendor
Remote access gateway
No plans to do this
75%
Desktop port blocking controls
8% 5% 3% 8%
61%
Database monitoring solution
13%
58%
Log management analysis/aggregation
51%
Formal model for information governance/assurance
49%
Compliance management software
47%
Multi-factor authentication
47%
Financial
Don't know
8% 4%
14%
16%
Channel
16%
16%
10% 3%
15%
11% 3%
20%
13%
18%
5%
12%
14%
13%
6%
15%
6%
18%
18%
Desktop/laptop-based DLP
44%
16%
11%
7%
22%
Security Information Management (SIM) solution
44%
14%
13%
6%
23%
Enterprise data classification
43%
17%
Network-based
MediaDLP
42%
End User
14%
13%
Enterprise Rights Management
41%
15%
13%
Enterprise data discovery
38%
0%
© 2009 Enterprise Strategy Group
10%
20%
20%
30%
40%
50%
Source: ESG Research Report, Protecting Confidential Data Revisited, April 2009.
13%
7%
6%
60%
26%
7%
13%
24%
9%
70%
21%
20%
80%
90%
100%