When I was in Israel at the end of 2012, I was talking with the folks putting the finishing touches on theĀ Check Point 2013 Security Report. Of course, since then, the report has been formally released and you can now read it for yourself. Here's a video preview of what you'll find in it:
[youtube https://www.youtube.com/watch?v=NiKu05gApeQ?feature=oembed&w=480&h=270]
Some of the data gathered for this report was related to the 3D Security Reports Check Point generated for customers during 2012 where we took a Security Gateway and either ran it in-line (in bridge mode) or plugged it into a mirror port on a customer's switch. It's worth pointing out that, in many cases,Ā a competitive security solution was already in placeĀ and the Check Point Security Gateways were seeing stuff the other solutions were missing.
Other data for this report also came from SensorNet, ThreatCloud, and results from ourĀ Endpoint Security Best Practices Report, which is a great way to find out if your Windows PC is configured according to our Best Practices.
The most surprising statistics?
- 63% of the organizations surveyed had at least one malicious bot in their network.Ā
- 43% of the organizations surveyed had traffic to/from an anonymizer service.
Of course, if you're knee deep in the security space, 0% of this is news to you.