
The need for organizations to better manage and secure the devices and applications that employees are using to access corporate resources in the new Everywhere Workplace is a primary budget growth driver
Ivanti, the automation platform that helps make every IT connection smarter and more secure, today announced the results of a survey, which revealed that IT security budgets are spiralling out of control as organizations adapt to the Everywhere Workplace. Almost all CISOs (92%) highlighted the need to deploy additional security measures to better enable and secure employees as they work from anywhere as the primary budget growth driver. Four in five (80%) CISOs also pinpointed the need to replace passwords with more secure forms of authentication.The study, which polled 400 CISOs across EMEA, found that the average IT security budget last year was over €64 million, and 81% expect this to increase over the next 12 months. When pressed on the specific software solutions they plan to invest in during the next year, unified endpoint management (UEM) and biometric authentication solutions came out on top. Despite CISOs claiming that over two-fifths (41%) of their overall security budget was spent on UEM software in the last year, four in five (80%) said they expect investment in specialized UEM software to increase over the next year. This increase in investment is primarily to manage and secure the mass influx of devices attempting to access corporate resources as employees work from anywhere.
Seven in ten (70%) CISOs claimed that their organization’s reliance on biometric authentication to enable remote access to business data would increase, with a quarter (24%) saying it would significantly increase. The heightened focus on biometric authentication is likely due to the significant growth in phishing attacks.
According to Verizon's 2020 Data Breach Investigations Report, 22% of breaches in 2019 involved phishing, but 75% of organizations around the world experienced some kind of phishing attack in 2020. The top type of data compromised in these phishing attacks is credentials, including passwords. By adopting mobile device authentication with biometric- based access, organizations can eliminate the primary point of compromise in phishing attacks. When asked how their investment in biometric authentication solutions would change compared to last year, 70% of respondents stated their investment would increase, while 22% said it would greatly increase.
Nigel Seddon, VP EMEA West, Ivanti said: “The emergence of the Everywhere Workplace has led to an explosion of remote devices attempting to gain access to corporate resources. This new distributed work landscape has created a huge headache for CISOs worldwide as the influx of devices has provided cybercriminals with multiple new vectors to try and exploit. CISOs need to ensure they have full visibility into all devices trying to access their company network and then manage and secure those devices to the best of their ability.
As a result, IT security budgets are spiralling out of control. To better manage IT and software spending, CISOs should consider implementing spend intelligence technology. Spend intelligence provides insight into software landscapes and application spend across all IT environments improving operational speed, asset visibility, and can cut costs. Spend intelligence, coupled with a zero trust approach to secure digital assets from cloud to edge by verifying each asset and transaction ahead of permitting access alongside biometric authentication, will create a stronger security standard, improve the user experience, control IT security spend, and help remove pressure from help desks optimizing IT environments.”
To download a complimentary copy of the survey results, please visit here.
Fachartikel

Der Wettbewerbsvorteil dezentraler Identität im europäischen Finanzwesen

Wo sind Deine Daten hin?

Autonome APTs: Die Claude-basierte Operation wird nicht die letzte sein

Stand der Technik umsetzen: Wie Unternehmen jetzt handeln sollten

Industrielles Phishing gegen Italiens Infrastruktur: Group‑IB entdeckt automatisiertes Aruba‑Imitierendes Phishing‑Kit
Studien

49 Prozent der IT-Verantwortlichen in Sicherheitsirrtum

Deutschland im Glasfaserausbau international abgehängt

NIS2 kommt – Proliance-Studie zeigt die Lage im Mittelstand

BSI-Lagebericht 2025: Fortschritte in der Cybersicherheit – Deutschland bleibt verwundbar

Forrester veröffentlicht Technologie- und Sicherheitsprognosen für 2026
Whitepaper

Industrial AI: KI als Treiber der Wettbewerbsfähigkeit

Vorbereitung auf künftige Cyberbedrohungen: Google veröffentlicht „Cybersecurity Forecast 2026“

Aktuelle Studie zeigt: Jeder Vierte in Deutschland bereits Opfer von digitalem Betrug

Cybersecurity in Deutschland: 200 Milliarden Euro Schaden trotz steigender IT-Ausgaben

Die EU bleibt weiterhin Ziel zahlreicher, sich überschneidender Bedrohungsgruppen
Hamsterrad-Rebell

Identity und Access Management (IAM) im Zeitalter der KI-Agenten: Sichere Integration von KI in Unternehmenssysteme

Infoblox zeigt praxisnahe IT-Security-Strategien auf it-sa 2025 und exklusivem Führungskräfte-Event in Frankfurt

IT-Security Konferenz in Nürnberg: qSkills Security Summit 2025 setzt auf Handeln statt Zögern

Von Palo Alto nach Paderborn: Wie eine Initiative US-Cyberfachkräfte für Deutschland gewinnen will






