IT Organizations That Trade Security for Performance Deserve Neither

Share  
1  |  2  |  3  |  4  |  5
Previous Next

Click through for results from a Crossbeam security performance survey.

One of the dirty little secrets of IT security is that a lot of the security features that IT organizations have available to them are either not used or ratcheted down to the point where they might as well not have been there at all.

The reason this situation is so endemic across enterprise IT is simple. A great many of the security processes that should be running adversely affect the performance of the applications that run on the network. As a result, network managers routinely turn off security features in the name of application performance.

A new survey of 487 IT professionals that was conducted by Crossbeam, a provider of high-performance security gateways, finds that while 91 percent of the respondents were not only making tradeoffs between security and performance, a full 81 percent were actually disabling security features.

As Jim Freeze, Crossbeam vice president of marketing and business development notes, many IT organizations would like to save money by consolidating security appliances. But the more security features that are consolidated on the new security gateway, the greater the probability that device will have an adverse effect on performance. As a result, Freeze says that IT organizations need to be certain that next-generation security devices not only meet their application performance requirements for today, but also the performance levels those applications will require tomorrow.

Unfortunately, the survey finds that IT organizations have little faith in the performance metrics cited by security vendors, which means that before committing to their next security architecture, IT organizations need to do a lot of hands-on testing because performance mileage is definitely going to vary.

In the meantime, to paraphrase Ben Franklin, IT organizations would do well to remember that those who would sacrifice performance for security, generally wind up with neither.

More Slideshows:


Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security63-290x195 Latest Cybersecurity Crisis: Where's the Talent?

How do we get more skilled workers and white hats on board to fight the growing number of bad guys out there? ...  More >>

Web4-190x128 Top DNS Threats and How to Deal with Them

Since most standard security measures do not block DNS traffic, cyber criminals are able to infiltrate networks and gain access to proprietary data. ...  More >>

Risk6-290x195 Top Barriers to Effective Vulnerability Risk Management

When it comes to the effectiveness of traditional vulnerability risk management programs, the challenges are often rooted in the process itself. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date