IT’s Dirty Little Secret: Security Reporting

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next IT’s Dirty Little Secret: Security Reporting-2 Next

How many security and IT operations tools does your organization deploy? The answer is likely in the double digits. As a result, there is a lot of information available at any IT staffer’s fingertips. But this could provide a false sense of security: When it comes to these solutions’ reporting, they are often incomplete and do not always present the reality. From PC lifecycle tools to antivirus, to patching systems and everything in between, the quality of data makes it near impossible to make sense of it in a meaningful way.

Organizations of all sizes spend time and money installing solutions to help protect their networks and keep their IT environment protected. Many of these solutions can do their job when operational but, unfortunately, are rendered useless when they are not installed, become outdated, or are not actively running or configured properly. One of the biggest challenges for every organization is to evaluate their security posture as these solutions are lacking sufficient self-health validation reporting, which causes an unclear picture of your entire security posture.

According to Hilik Kotler, executive vice president of product development at Promisec, inaccurate reporting is widespread yet often not talked or written about. However, this “dirty little secret” of reporting errors could have grave consequences if left unaddressed. What are the most headache-inducing reporting issues and how can IT address them? Click through to find out.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.