Overreliance on Manual Processes Compromises IT Security

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18
Previous Next

Click through for results from a security survey conducted by Tufin Technologies on firewall management.

When it comes to managing IT security in general and firewalls specifically, many IT organizations are relying on manual processes that simply can’t keep pace with a rapidly changing threat landscape.

In a survey of 100 network security professionals conducted by Tufin Technologies, a provider of IT security management software, it's clear that the majority of IT organizations are relying on manual IT labor to change firewall rules. That may have been a viable approach once upon a time, but as the volume and complexity of IT security threats continue to increase, it’s pretty clear that manual processes will no longer scale to meet the threat.

More Slideshows:


Seven Steps to Leverage a Counteroffer for a Larger Salary Put yourself in the best position to leverage a counteroffer and win a salary negotiation — or retreat with dignity.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

infra44-190x128 Six E-Signature Security Requirements for Digital Transactions

Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. ...  More >>

DigitalGuardianSecurityMistakes0x Seven Data and Information Security Mistakes Even Smart Companies Make

It's not always lack of resources that leads to vulnerabilities, although for some that's an issue -- it's often about common traps that are easily avoidable. ...  More >>

Security59-190x128 Six Steps to Surviving Your First Breach

Once you accept that everything that can go wrong will do so at the worst possible time, there are things that can be done today to help rein in the trials of the future. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date