recommended reading

Survey: Agency Cyber Pros Prefer Perimeter Defense to Encryption


Federal cybersecurity professionals say they plan to spend more on data security this year, according to a new survey, but what’s on their shopping list?

A new report from IT security company Vormetric and 451 Research, found most agencies are still overly reliant on perimeter defenses and are not paying enough attention to tools that protect data at rest, such as encryption.

The survey results show “that in many ways, security professionals are like generals fighting the last war,” researcher Garrett Bekker wrote in the report accompanying the survey results. “Spending intentions reflected a tendency to stick with what has worked – or not worked – in the past, such as network and endpoint security.”

The report surveyed 100 senior security executives in the federal government on their planned spending priorities this year compared to a few specific areas in the private sector, such as financial services, retail and health care.

When it comes to cyber defense in the federal government, perimeter defense is still king, according to the survey. Some 53 percent of respondents said their agencies were planning to increase spending on network defenses. Another 46 percent said they planned investments in analysis and correlations tools.

Encryption and other data-at-rest defenses, on the other hand, were ranked “dead last” in terms of spending plans over the next year, the report found. Just 37 percent of respondents said they were planning to increase their spending on such defenses.

Federal security pros appear to still have a high degree of confidence in perimeter defense. Sixty percent of federal security pros said they believe network defenses are very effective, higher than any other sector the report surveyed.

The report argued that thinking is outdated. “Perimeter defenses offer little help defending against multistage attacks,” the report stated, while other measures, such as file and application encryption “have proven to be effective at protecting data after attackers have bypassed perimeter defenses.”

Full disclosure: Vormetric offers a suite of encryption and tokenization products and services.

Still, the extent to which some federal agencies were properly locking down sensitive data, including by using encryption, came into light last year when it was revealed the Office of Personnel Management had failed to encrypt background investigation files stored on agency computer systems that contained personal information on millions of federal employees -- files later stolen by hackers in. OPM officials told lawmakers it couldn’t encrypt the sensitive data because its computer networks were too antiquated.

More than half of respondents in the survey -- 51 percent -- cited “complexity” as the biggest barrier to more widespread implementation of data security measures.

The federal government’s well-documented challenges to hire and retain cybersecurity experts also turned up in the survey results. Forty-four percent respondents pointed lack of adequate staffing as the biggest barrier -- higher than for any other sector.

About 43 percent of feds cited budget constraints as the biggest factor -- nearly double the percentage of respondents from more well-resourced sectors, such as financial services.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.