Overreliance on Manual Processes Compromises IT Security

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18
Previous Next

Click through for results from a security survey conducted by Tufin Technologies on firewall management.

When it comes to managing IT security in general and firewalls specifically, many IT organizations are relying on manual processes that simply can’t keep pace with a rapidly changing threat landscape.

In a survey of 100 network security professionals conducted by Tufin Technologies, a provider of IT security management software, it's clear that the majority of IT organizations are relying on manual IT labor to change firewall rules. That may have been a viable approach once upon a time, but as the volume and complexity of IT security threats continue to increase, it’s pretty clear that manual processes will no longer scale to meet the threat.

More Slideshows:


Seven Steps to Leverage a Counteroffer for a Larger Salary Put yourself in the best position to leverage a counteroffer and win a salary negotiation — or retreat with dignity.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security48-290x195 Five Myths Holding Your Security Program Back

In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. ...  More >>

Misc44-290x195 Most Dangerous Cyber Celebrities of 2014

McAfee recently released its eighth annual study revealing the most dangerous celebrities to search for online. The study found a mix of comedians and musicians among the most dangerous. ...  More >>

Security47-190x128 From a Hacker's Perspective: How to Breach a Point-of-Sale System

Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.