• ERT Report 2014

      What's Keeping Us Up At Night?

      Read the 2014-2015 Global Application & Network Security Report

      By Radware Emergency Response Team

  • 2014 was a watershed year for the security industry. Cyber-attacks reached a tipping point in terms of quantity, length, complexity and targets. In addition, mitigation techniques are being challenged with the emergence of three disruptive macro IT trends such as cloud migration, the rise of the Internet of Things (IoT) and move toward software defined network (SDN). Even organizations with by-the-book security programs can be caught off guard.

    Radware's "2014-2015 Global Application & Network Security Report" provides a comprehensive and objective review of 2014 cyber-attacks from both a business and a technical perspective and gives best practice advice for organizations to consider when planning for cyber-attacks in 2015. It also offers a framework for understanding the "why" behind cyber-attacks - providing an orderly way to assess seemingly chaotic threats.

    Key Highlights

    Constant Attacks on the Rise

    19% of the major attacks reported were considered "constant" by the targeted organization, while 52% of respondents felt they could only fight a campaign for a day or less.

    New Points of Failure in DDoS Attacks

    The Internet pipe has been identified as the number-one failure point in 2014 and reflective attacks represent 2014's single largest DDoS "headache."

    Hybrid Solutions Gaining Ground

    More than a third of respondents indicated they have employed hybrid solutions to help gain ground against attacks, combining on-premise equipment with cloud solutions. Nearly half suggest that they will employ a hybrid solution by 2015.

    Executive Insights – What Keeps Security Professionals up at Night

    A qualitative study and exploration of the most pressing problems and persistent challenges that can cause a loss of sleep with executives in the C-suite.

    Radware respects your privacy. Personal Information is not used or provided to any third party. Read privacy policy & terms of use for more information.