{"id":8876,"date":"2015-04-27T14:00:33","date_gmt":"2015-04-27T21:00:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8876"},"modified":"2022-04-05T22:01:54","modified_gmt":"2022-04-06T05:01:54","slug":"survey-says-protection-of-intellectual-property-is-top-priority","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/survey-says-protection-of-intellectual-property-is-top-priority\/","title":{"rendered":"Survey Says\u2026 Protection of Intellectual Property is Top Priority"},"content":{"rendered":"<p><em>This is the last post in a <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ignite-2015-survey\/\" target=\"_blank\" rel=\"noopener\"><em>three-part series<\/em><\/a><em> highlighting the results from a Palo Alto Networks survey of 233 <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/save-the-date-for-ignite-2016\/\" target=\"_blank\" rel=\"noopener\"><em>Ignite 2015<\/em><\/a><em> attendees at the end of March. The survey uncovered what\u2019s keeping security professionals up at night, cybersecurity pain points, and what specific concerns they have for their organizations. (<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/survey-says-zero-day-attacks-and-evasive-malware-are-biggest-risks\/\" target=\"_blank\" rel=\"noopener\">Part one<\/a>, <a href=\"http:\/\/bit.ly\/1aLC9gu\" target=\"_blank\" rel=\"noopener\">part two<\/a>)<\/p>\n<p>Based on the previous two posts in this series, we know that boards of directors are taking an active interest in cybersecurity, and we know that cybersecurity professionals are most concerned about zero-day attacks and evasive malware. But what are they so eager to protect?<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8878 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-500x500.jpg\" alt=\"PAN BLOG IMAGE 04102015-01\" width=\"500\" height=\"500\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-04102015-01.jpg 1563w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Perhaps not surprisingly, theft of intellectual property ranked highest on the list. Theft of personal information came in a close second, with denial of service attacks and theft of financial records rounding out the top of the list.<\/p>\n<p>Intellectual property is the crown jewel of many organizations. This is the data that, if compromised, poses the greatest competitive risk to organizations large and small. And as many recent breaches have demonstrated, theft of personal information poses unmatched reputational risk even to those companies without intellectual property to secure.<\/p>\n<p>To counter these risks and protect this valuable data, detection and remediation are not sufficient strategies. Instead, we must focus on preventing attacks <em>before<\/em> a malicious actor is able to exfiltrate valuable data.<\/p>\n<p>As Palo Alto Networks emphasized at Ignite this year, we\u2019re taking on cyberattackers and aiming to make the cost of network infiltration higher than the potential rewards. We do this by combining network, cloud and endpoint security into a tightly integrated\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">enterprise security platform<\/a>\u00a0that delivers automated prevention against known and unknown threats at every point in the kill chain.<\/p>\n<p>We\u2019ll repeat this survey on an ongoing basis and we\u2019ll share the latest results and their evolution over time.<\/p>\n<h3>Join the Conversation<\/h3>\n<p>What cybersecurity concerns keep you up at night? Share your comments below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the last post in a three-part series highlighting the results from a Palo Alto Networks survey of 233 Ignite 2015 attendees at the end of March. The survey uncovered what\u2019s &hellip;<\/p>\n","protected":false},"author":100,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,99,108],"tags":[454,396,1151,352,388,201],"coauthors":[888],"class_list":["post-8876","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-ignite","category-threat-prevention-2","tag-enterprise-security-platform","tag-ignite-2015","tag-ignite-2015-survey","tag-intellectual-property","tag-kill-chain","tag-survey"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8876"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8876\/revisions"}],"predecessor-version":[{"id":8879,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8876\/revisions\/8879"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8876"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}