"Mobile devices are getting infected, and sensitive data is being stolen via virus-riddled apps from unsanctioned mobile markets," said Hui. "Organizations have little to no control or visibility into employee-owned devices and further issues are caused due to the blurring of corporate and personal data."
Top of user-agendas
"The top keys are always the same three things," said Leung. "Increase employee productivity--such as BYOD initiatives. Improve the business by adopting more competitive strategies such as cloud. And control costs, with emphasis on decreasing opex--for example, a complete end-to-end security strategy that can be integrated seamlessly."
F5's Hui agrees. "It's a perfect storm for enterprises," she said, "having to fight new and increasingly complex cyberattacks brought on by a wave of technology transformations such as cloud and mobile while dealing with budget pressure."
"As enterprises move applications and infrastructure to cloud or datacenters," said Leung, "they're concerned about service interruptions and data being compromised by hackers. We have seen increased uptake of security products that aim to protect Web-based applications and also defending Internet attacks like DDoS."
"We've seen high demand for flexible, certified Web application firewalls and comprehensive, policy-based Web application security that can address emerging threats at the application level," said Hui. "This combination significantly reduces the risk of damage to IP, data, and Web applications."
Corporates open wallet for security
"Security, especially dealing with new challenges associated with mobile and BYOD, is definitely a priority spend despite resources being squeezed as businesses look for efficiency savings across the board," said Hui.
Juniper's Leung agrees: "We feel that the IT market is tough these days, but corporate spending in security is still increasing. As corporates invest in new platforms like mobile devices and cloud--which make business transactions more effective and ubiquitous--the need to protect and secure these channels are also important."
"Organizations cannot be sloppy on cybersecurity as that will threaten the business with severe compromise from an operational or public relations perspective," cautioned Hui. "Security spend needs to rise to deal with new and increasingly complex threats in an new IT environment infused with apps, mobile, public cloud and big data."
Trends in 2014
"With adoption of new technologies like virtualization, cloud, BYOD, or even SDN, enterprises need an integrated strategy to manage end-to-end security across their infrastructure," said Leung. "A security breach in any part of their operation-chain can be disastrous."
"A comprehensive, multi-layered security approach is best to mitigate cyberattacks," said Hui. "For an effective defense against cyberattacks, enterprises should have the following covered in their security framework: access layer, application layer, network layer and compliance."
"If enterprises still manage their security in individual silos, opex is a burden for the operation," said Leung from Juniper. His simple advice for enterprises: plan out an integrated security strategy ahead of time.
Sign up for CIO Asia eNewsletters.