SHARE
Facebook X Pinterest WhatsApp

Managing the Inevitable Security Breach

While most IT organizations are resigned to the fact that they will experience a significant security incident in the next three years, the vast majority are unprepared to deal with its consequences. Those are the findings of a recent survey of 200 IT security professionals conducted by Trusted Strategies on behalf of Solera Networks, a […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jan 19, 2011

While most IT organizations are resigned to the fact that they will experience a significant security incident in the next three years, the vast majority are unprepared to deal with its consequences.

Those are the findings of a recent survey of 200 IT security professionals conducted by Trusted Strategies on behalf of Solera Networks, a provider of a network forensics appliance.

The survey finds that 82 percent of those surveyed expect to have a significant security issue in the next three years, but 52 percent admitted that their organization is not ready to handle such an issue. And 35 percent said they currently lack an up-to-date security response plan. Worse yet, 64 percent said they lack the tools to determine the full scope of a security incident, and 20 percent said it would be impossible to determine the full scope of such an incident.

Pete Schlampp, vice president of marketing and product management for Solera Networks, says that as the security landscape gets more threatening and complex to manage, most IT organizations are poorly equipped to deal with such threats.

In fact, the major concern for IT organizations seems to be actual systems outages and the length of time it takes to recover a system if it crashes. This suggests, says Schlampp, that some IT organizations might be too focused on parochial concerns rather than on how the malware on their system might actually be affecting the business, especially when it comes to theft of data.

Obviously, the convergence of security and IT operations is critically important. But the real challenge, says Schlampp, is first accepting the fact that some sort of security incident is going to happen and then putting in place a holistic approach to managing the problem that not only discovers all the IT issues at hand, but also all the potential ramifications that breach could have on the business. Only then will IT organizations really be pursuing a true risk-based approach to security management.

Managing the Inevitable Security Breach - slide 1

Click through for results from a survey conducted by Solera Networks on network security.

Managing the Inevitable Security Breach - slide 2

IT, rather than business, issues dominate.

Managing the Inevitable Security Breach - slide 3

Attacks are motivated by money.

Managing the Inevitable Security Breach - slide 4

Most have one, but confidence in them is another matter.

Managing the Inevitable Security Breach - slide 5

There is no crime trail to follow.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.