Research

Netwrix Research Lab conducts industry surveys among IT pros worldwide to discover up-to-date interests and granular trends' analysis of the industry

2016 IT Risks Report

2016 IT Risks Report

The 2016 IT Risks Report unveils how IT changes influence various cyber risks and how well organizations are prepared to beat them. We explore current IT auditing tendencies, whether organizations have relevant IT controls and visibility into IT environments to mitigate cyber risks.

67%

of organizations experienced security incidents that involved malicious activity.

53%

of surveyed companies had operational issues caused by malicious, incorrect, and unauthorized IT changes.

45%

of respondents had compliance issues due to lack of visibility into IT changes.

Look inside now
2016 SIEM Efficiency Survey Report

2016 SIEM Efficiency Survey Report

SIEM solutions are considered to be advanced mechanisms for improving security for any enterprise. At the same time, SIEM systems have certain limitations that make them inefficient without additional investments in technology and personnel, which in turn significantly increase the total cost of SIEM ownership.

Netwrix studied the opinions of IT pros who use SIEM solutions for security and IT infrastructure monitoring. The purpose of the survey was to find out what bothers IT pros the most about their existing SIEM solutions and what ways they see to leverage their SIEMs.

69%

of companies want to reduce SIEM expenses.

65%

of respondents say it's hard to find necessary data upon request in SIEM solution.

29%

of IT pros strengthen their SIEM through integration with IT auditing solution.

Look inside now
2016 Netwrix Customer Survey

2016 Netwrix Customer Survey

A top-notch user experience has always been one of the main business goals for customer-driven companies. This survey was undertaken to gain a better insight into customer feedback, identify the most popular use cases and make sure that customers achieve positive results with Netwrix Auditor. Our goal to further improve our offer and meet customers’ needs and expectations.

75%

of customers pass compliance audits faster.

84%

of respondents are able to better maintain security policies.

83%

of IT pros have significantly reduced time-consuming routine tasks.

Look inside now
2015 Cloud Security Survey

2015 Cloud Security Survey

Cloud technology is gaining increasing attention from businesses looking for technological innovations to optimize expenses and operations. The cloud offers modern businesses different advantages, such as scalability, global availability, streamlined operations, and reduced costs.

However, like any other immature technology, the cloud has flaws. The most common concern associated with the cloud is its security. We have decided to explore this problem to find out what IT professionals think of cloud adoption, how critical the security issue is for these professionals and how this issue impacts the entire decision-making process.

65%

of surveyed IT pros indicated that data security is their number one concern associated with the technology.

69%

of companies are afraid that migration to the cloud will increase risks of unauthorized access.

71%

of enterprises perceive continuous auditing of cloud infrastructure as a very important part of security guarantees.

Look inside now
2015 State of IT Changes Survey

2015 State of IT Changes Survey

In light of the wave of data breaches affecting diverse companies we decided to continue researching into how companies deal with IT changes and initiated a second survey to find out how massive security breaches and violations of compliance standards have changed the organizations’ attitudes toward change management.

IT professionals answered questions about change management controls in their organizations and shared some insights about how these policies worked in the real world. The main question that intrigued us was whether companies became more proactive in achieving visibility into their IT infrastructures, and therefore became more successful in strengthening security and ensuring system uptime.

70%

of surveyed IT pros stated they from time to time make undocumented changes, against 57% in 2014.

75%

of enterprises have established change auditing processes to monitor their IT infrastructures, against 52% in 2014.

58%

of small companies have started to track changes despite the lack of change management controls, against 30% last year.

Look inside now
2014 SIEM Efficiency Report

2014 SIEM Efficiency Report

Security has always been a hot topic, especially for large companies that solve this issue with deploying SIEM solutions, which is a bold step toward delivering visibility to cyber security posture. SIEM solutions allow you to look into security logs and gather information that helps manage user and service privileges, as well as identify and report on security threats and suspicious activity.

This survey was meant to find out how IT professionals are leveraging their SIEM to provide visibility across the entire IT infrastructure and how this helps them strengthen IT security.

62%

of surveyed IT pros stated that they have encountered security violations of their IT infrastructures.

73%

of SMBs make little effort to ensure security of their IT infrastructures and struggle to monitor changes.

74%

of IT professionals admitted that deploying a SIEM solution didn’t prevent security incidents from happening.

Look inside now
2014 State of IT Changes Survey

2014 State of IT Changes Survey

Changes to critical IT systems are a daily part of any IT organization’s ability to meet the constant barrage of requests for improved, faster and more efficient services. Without any means to track what has changed, an IT organization has little ability to know what change was the root of a data breach or what caused a system to stop functioning properly.

The report provides an idea of how organizations today see the impact of changes made, the use of change auditing and the methods and processes intended to maintain security and system availability.

65%

of surveyed IT pros have made changes that caused services to stop.

39%

of IT professionals have made a change that was the root cause of a security breach.

62%

of companies have little or no real ability to audit the changes made, revealing serious gaps in meeting security best practice or compliance objectives.

Look inside now