IT’s Dirty Little Secret: Security Reporting

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous IT’s Dirty Little Secret: Security Reporting-1 Next

Click through for the most headache-inducing security report issues and how IT can address them, as identified by Hilik Kotler, executive vice president of product development at Promisec.

Organizations of all sizes spend time and money installing solutions to help protect their networks and keep their IT environment protected. Many of these solutions can do their job when operational but, unfortunately, are rendered useless when they are not installed, become outdated, or are not actively running or configured properly. One of the biggest challenges for every organization is to evaluate their security posture as these solutions are lacking sufficient self-health validation reporting, which causes an unclear picture of your entire security posture.

According to Hilik Kotler, executive vice president of product development at Promisec, inaccurate reporting is widespread yet often not talked or written about. However, this “dirty little secret” of reporting errors could have grave consequences if left unaddressed. What are the most headache-inducing reporting issues and how can IT address them? Click through to find out.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.