Overreliance on Manual Processes Compromises IT Security

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Previous Next

Click through for results from a security survey conducted by Tufin Technologies on firewall management.

When it comes to managing IT security in general and firewalls specifically, many IT organizations are relying on manual processes that simply can’t keep pace with a rapidly changing threat landscape.

In a survey of 100 network security professionals conducted by Tufin Technologies, a provider of IT security management software, it's clear that the majority of IT organizations are relying on manual IT labor to change firewall rules. That may have been a viable approach once upon a time, but as the volume and complexity of IT security threats continue to increase, it’s pretty clear that manual processes will no longer scale to meet the threat.

More Slideshows:


Seven Steps to Leverage a Counteroffer for a Larger Salary Put yourself in the best position to leverage a counteroffer and win a salary negotiation — or retreat with dignity.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

infra86-190x128.jpg Top 5 Places Your Enterprise Data Is at Risk

The top five areas exposing your sensitive data to risk and tips for minimizing security vulnerabilities. ...  More >>

Security99-290x195.jpg 5 Ways to Keep Cybersecurity on Track While on Vacation

Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ...  More >>

Security98-190x128 5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.