Overreliance on Manual Processes Compromises IT Security

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Previous Next

Click through for results from a security survey conducted by Tufin Technologies on firewall management.

When it comes to managing IT security in general and firewalls specifically, many IT organizations are relying on manual processes that simply can’t keep pace with a rapidly changing threat landscape.

In a survey of 100 network security professionals conducted by Tufin Technologies, a provider of IT security management software, it's clear that the majority of IT organizations are relying on manual IT labor to change firewall rules. That may have been a viable approach once upon a time, but as the volume and complexity of IT security threats continue to increase, it’s pretty clear that manual processes will no longer scale to meet the threat.

More Slideshows:


Seven Steps to Leverage a Counteroffer for a Larger Salary Put yourself in the best position to leverage a counteroffer and win a salary negotiation — or retreat with dignity.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

UtimacoEVMTokenization0x What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. ...  More >>

ZixCorpDataLeaks0x Top Data Leak Vulnerabilities and How to Secure Them

All companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data. ...  More >>

SysAidIoTSecurity0x Beware the Hidden Dangers of the Internet of Things

It finally feels as though we're about to hit the point of no return with IoT. IT departments must now consider and address the security implications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date