HomeRisk ManagementsLegacy Security Tools Are Ineffective for Data Protection

Legacy Security Tools Are Ineffective for Data Protection

Published on

spot_img

Traditional Network Security Tools Hinder Data Protection Efforts, According to New Report

A recent report commissioned by Capital One Software and conducted by Forrester Research has unveiled a concerning landscape in data security practices across organizations. The finding illustrates that a substantial number of IT leaders are grappling with inadequate data security measures despite recognizing the increasing criticality of this issue. The report reveals that 72% of security professionals acknowledge that data security is more crucial now than at any time in the past. Yet, investments in traditional network and perimeter security tools are significantly hindering effective data protection strategies.

The study indicates a pressing need for organizations to rethink their data protection methodologies. Without this shift, the adoption of Artificial Intelligence (AI) technologies is deemed "impossible." The report highlights that as AI agents begin to operate autonomously, they have the potential to bypass human oversight, thereby escalating the risk of unintended data exposure. This concern marks a pivotal moment where businesses must prioritize adapting their security frameworks to address evolving technological landscapes.

One of the primary obstacles identified in the report is the reliance on legacy siloed solutions, which limit organizations from achieving comprehensive visibility into their vulnerabilities. Over half of the security professionals surveyed indicated that they do not have complete awareness of their security weaknesses. This lack of visibility poses a significant threat, particularly as nearly half of the respondents admitted that their organizations struggle to compete effectively due to existing data security processes.

As of February 2026, organizations have employed a variety of solutions to meet their data security goals, including:

  • Network security technologies (e.g., Secure Access Service Edge [SASE], firewalls, Virtual Private Networks [VPNs], and Intrusion Detection/Prevention Systems [IDS/IPS]) utilized by 70% of respondents.
  • Identity and Access Management (IAM) systems reported by 65%.
  • Vulnerability management tools used by 60%.

Despite the implementation of these measures, the study underscores a critical evaluation of legacy solutions. It states, “While many organizations believe their current tools adequately protect their data, legacy solutions lack the speed, flexibility, scalability, and AI readiness required today.” This acknowledgment calls for a reevaluation of the tools and methods used to ensure data remains secure in a rapidly changing environment.

In a statement regarding the research findings, Capital One Software emphasized that “modern data security must evolve beyond static, perimeter-based approaches to address the constant movement of data across cloud and AI environments.” They argue that companies need integrated strategies that not only secure data across various environments but also leverage it to create business value. This holistic approach encompasses flexibility, data sovereignty, and support for emerging AI use cases.

Furthermore, the report highlights that creating value through data should be the driving force behind its protection. Tokenization emerges as a promising solution to balance data security and usability. However, the report notes that two-thirds of decision-makers have yet to adopt tokenization solutions. This gap signifies a significant opportunity for organizations to harness tokenization to reduce risk while maximizing their return on investment (ROI) from data.

In terms of future priorities, IT leaders indicated several focal points for the next 12 months:

  • Protecting enterprise data at scale (66%).
  • Improving overall security posture in relation to external threats (64%).
  • Adopting a more proactive approach to security (63%).
  • Investing in or updating technology for enhanced operational efficiency and customer experience (62%).
  • Strengthening the overall security posture (58%).

The research engaged 211 director-level and above decision-makers in IT and data analytics, all of whom hold responsibility for their organization’s security and risk technology strategy.

Capital One Software positions itself as a leading enterprise business-to-business software firm, specializing in cloud and data management solutions tailored for companies operating within the cloud. The insights from this report are poised to challenge organizations to evolve their data security measures, ensuring they not only protect sensitive information but also optimize its utility in an ever-competitive marketplace.

Source link

Latest articles

US FCC Allows Consumer Routers to Receive Updates Until 2028

Endpoint Security, Governance & Risk Management, ...

Mistral AI SDK and TanStack Router Targeted in NPM Software Supply Chain Attack

On May 11, a series of security breaches emerged that drew the attention of...

Cyber Briefing for May 12, 2026 – CyberMaterial

In the ever-evolving landscape of cybersecurity, recent developments have revealed a troubling trend: an...

OpenAI Launches Cybersecurity Model for Europe

OpenAI Takes Steps to Enhance Cybersecurity in Europe Amid Regulatory Scrutiny The ongoing battle for...

More like this

US FCC Allows Consumer Routers to Receive Updates Until 2028

Endpoint Security, Governance & Risk Management, ...

Mistral AI SDK and TanStack Router Targeted in NPM Software Supply Chain Attack

On May 11, a series of security breaches emerged that drew the attention of...

Cyber Briefing for May 12, 2026 – CyberMaterial

In the ever-evolving landscape of cybersecurity, recent developments have revealed a troubling trend: an...