IT Organizations That Trade Security for Performance Deserve Neither

Email     |     Share  
1 | 2 | 3 | 4 | 5
Previous Next

Click through for results from a Crossbeam security performance survey.

One of the dirty little secrets of IT security is that a lot of the security features that IT organizations have available to them are either not used or ratcheted down to the point where they might as well not have been there at all.

The reason this situation is so endemic across enterprise IT is simple. A great many of the security processes that should be running adversely affect the performance of the applications that run on the network. As a result, network managers routinely turn off security features in the name of application performance.

A new survey of 487 IT professionals that was conducted by Crossbeam, a provider of high-performance security gateways, finds that while 91 percent of the respondents were not only making tradeoffs between security and performance, a full 81 percent were actually disabling security features.

As Jim Freeze, Crossbeam vice president of marketing and business development notes, many IT organizations would like to save money by consolidating security appliances. But the more security features that are consolidated on the new security gateway, the greater the probability that device will have an adverse effect on performance. As a result, Freeze says that IT organizations need to be certain that next-generation security devices not only meet their application performance requirements for today, but also the performance levels those applications will require tomorrow.

Unfortunately, the survey finds that IT organizations have little faith in the performance metrics cited by security vendors, which means that before committing to their next security architecture, IT organizations need to do a lot of hands-on testing because performance mileage is definitely going to vary.

In the meantime, to paraphrase Ben Franklin, IT organizations would do well to remember that those who would sacrifice performance for security, generally wind up with neither.

More Slideshows:


Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightProactiveRiskMgmt0x 5 Steps for Proactive Cyber Risk Management

Companies need to be more proactive and take steps to reduce their cybersecurity risks, as well as establish procedures should a breach occur. ...  More >>

CloudmarkPhishingScams0x Scammers Go Phishing: Business Email Compromise on the Rise

Tips for businesses and individuals on how to combat phishing attacks and prevent identity and tax fraud as financial losses. ...  More >>

SupplyChain1-290x195.jpg Security Risks in the Supply Chain

While the use of IoT technology enables retailers to better track their products from production through delivery in the supply chain, it also introduces a variety of security and data risks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.