How to Navigate the Common Pitfalls of Security Policy Management

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next How to Navigate the Common Pitfalls of Security Policy Management-2 Next

Think About the Process First

Even a great technology solution cannot fix a bad process, but it can force you to think about how your process should work. Generally, security teams have a process for adding rules, but very few have a process for removing or recertifying rules, changing objects, and removing IP addresses. Bring your teams together and think about how and when you update or remove rules and objects, and develop a repetitive process for managing these critical and ongoing tasks that you will use every single time.

It comes as no surprise to security practitioners that managing security is becoming more and more demanding. Organizations are facing more threats, greater complexity and increased demand for both security and application connectivity. While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect their security policy management basics.

In his years of interactions with companies across pretty much every geography and industry vertical, Nimmy Reichenberg, vice president of strategy at AlgoSec, has found that going back to the basics is key when managing an effective security policy and a crucial first step in making your organization more responsive, agile, compliant and secure. In this slideshow, Reichenberg has identified seven common pitfalls organizations face and tips for how to deal with them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.