
The need for organizations to better manage and secure the devices and applications that employees are using to access corporate resources in the new Everywhere Workplace is a primary budget growth driver
Ivanti, the automation platform that helps make every IT connection smarter and more secure, today announced the results of a survey, which revealed that IT security budgets are spiralling out of control as organizations adapt to the Everywhere Workplace. Almost all CISOs (92%) highlighted the need to deploy additional security measures to better enable and secure employees as they work from anywhere as the primary budget growth driver. Four in five (80%) CISOs also pinpointed the need to replace passwords with more secure forms of authentication.The study, which polled 400 CISOs across EMEA, found that the average IT security budget last year was over €64 million, and 81% expect this to increase over the next 12 months. When pressed on the specific software solutions they plan to invest in during the next year, unified endpoint management (UEM) and biometric authentication solutions came out on top. Despite CISOs claiming that over two-fifths (41%) of their overall security budget was spent on UEM software in the last year, four in five (80%) said they expect investment in specialized UEM software to increase over the next year. This increase in investment is primarily to manage and secure the mass influx of devices attempting to access corporate resources as employees work from anywhere.
Seven in ten (70%) CISOs claimed that their organization’s reliance on biometric authentication to enable remote access to business data would increase, with a quarter (24%) saying it would significantly increase. The heightened focus on biometric authentication is likely due to the significant growth in phishing attacks.
According to Verizon's 2020 Data Breach Investigations Report, 22% of breaches in 2019 involved phishing, but 75% of organizations around the world experienced some kind of phishing attack in 2020. The top type of data compromised in these phishing attacks is credentials, including passwords. By adopting mobile device authentication with biometric- based access, organizations can eliminate the primary point of compromise in phishing attacks. When asked how their investment in biometric authentication solutions would change compared to last year, 70% of respondents stated their investment would increase, while 22% said it would greatly increase.
Nigel Seddon, VP EMEA West, Ivanti said: “The emergence of the Everywhere Workplace has led to an explosion of remote devices attempting to gain access to corporate resources. This new distributed work landscape has created a huge headache for CISOs worldwide as the influx of devices has provided cybercriminals with multiple new vectors to try and exploit. CISOs need to ensure they have full visibility into all devices trying to access their company network and then manage and secure those devices to the best of their ability.
As a result, IT security budgets are spiralling out of control. To better manage IT and software spending, CISOs should consider implementing spend intelligence technology. Spend intelligence provides insight into software landscapes and application spend across all IT environments improving operational speed, asset visibility, and can cut costs. Spend intelligence, coupled with a zero trust approach to secure digital assets from cloud to edge by verifying each asset and transaction ahead of permitting access alongside biometric authentication, will create a stronger security standard, improve the user experience, control IT security spend, and help remove pressure from help desks optimizing IT environments.”
To download a complimentary copy of the survey results, please visit here.
Fachartikel

Phishing über LiveChat: Wie Angreifer SaaS-Plattformen für Datendiebstahl nutzen

XWorm 7.1 und Remcos RAT: Angreifer setzen auf dateilose Techniken und Windows-Bordmittel

KI im Cyberkonflikt: Warum Verteidiger die Nase vorn haben

KadNap: Wie ein neues Botnetz tausende Asus-Router als Proxy-Knoten missbraucht

ClickFix-Variante nutzt WebDAV und trojanisierte Electron-App zur Malware-Verteilung
Studien

Drucksicherheit bleibt in vielen KMU ein vernachlässigter Bereich

Sieben Regierungen einigen sich auf 6G-Sicherheitsrahmen

Lieferkettenkollaps und Internetausfall: Unternehmen rechnen mit dem Unwahrscheinlichen

KI als Werkzeug für schnelle, kostengünstige Cyberangriffe

KI beschleunigt Cyberangriffe: IBM X-Force warnt vor wachsenden Schwachstellen in Unternehmen
Whitepaper

Cloudflare Threat Report 2026: Ransomware beginnt mit dem Login – KI und Botnetze treiben die Industrialisierung von Cyberangriffen

EBA-Folgebericht: Fortschritte bei IKT-Risikoaufsicht unter DORA – weitere Harmonisierung nötig

Böswillige KI-Nutzung erkennen und verhindern: Anthropics neuer Bedrohungsbericht mit Fallstudien

Third Party Risk Management – auch das Procurement benötigt technische Unterstützung

EU-Toolbox für IKT-Lieferkettensicherheit: Gemeinsamer Rahmen zur Risikominderung
Hamsterrad-Rebell

Sicherer Remote-Zugriff (SRA) für Operational Technology (OT) und industrielle Steuerungs- und Produktionssysteme (ICS) – Teil 2

Incident Response Retainer – worauf sollte man achten?

KI‑basierte E‑Mail‑Angriffe: Einfach gestartet, kaum zu stoppen

NIS2: „Zum Glück gezwungen“ – mit OKR-basiertem Vorgehen zum nachhaltigen Erfolg







