IT Organizations That Trade Security for Performance Deserve Neither

Share  
1  |  2  |  3  |  4  |  5
Previous Next

Click through for results from a Crossbeam security performance survey.

One of the dirty little secrets of IT security is that a lot of the security features that IT organizations have available to them are either not used or ratcheted down to the point where they might as well not have been there at all.

The reason this situation is so endemic across enterprise IT is simple. A great many of the security processes that should be running adversely affect the performance of the applications that run on the network. As a result, network managers routinely turn off security features in the name of application performance.

A new survey of 487 IT professionals that was conducted by Crossbeam, a provider of high-performance security gateways, finds that while 91 percent of the respondents were not only making tradeoffs between security and performance, a full 81 percent were actually disabling security features.

As Jim Freeze, Crossbeam vice president of marketing and business development notes, many IT organizations would like to save money by consolidating security appliances. But the more security features that are consolidated on the new security gateway, the greater the probability that device will have an adverse effect on performance. As a result, Freeze says that IT organizations need to be certain that next-generation security devices not only meet their application performance requirements for today, but also the performance levels those applications will require tomorrow.

Unfortunately, the survey finds that IT organizations have little faith in the performance metrics cited by security vendors, which means that before committing to their next security architecture, IT organizations need to do a lot of hands-on testing because performance mileage is definitely going to vary.

In the meantime, to paraphrase Ben Franklin, IT organizations would do well to remember that those who would sacrifice performance for security, generally wind up with neither.

More Slideshows:


Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AppRiverScamPreventionTips0x Five Tips to Avoid Falling Victim to Online Scammers

While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill." ...  More >>

HAXLR8RStartups0x Robotics Take Center Stage: Ten New Hardware Startups

Recently, HAXLR8R held its Demo Day in San Francisco, where it revealed its fifth class of new hardware startups, which span the markets from wearables to security to biology. ...  More >>

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date