Overreliance on Manual Processes Compromises IT Security - Slide 16

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Next Overreliance on Manual Processes Compromises IT Security-16 Next

The crux of the problem for many.

When it comes to managing IT security in general and firewalls specifically, many IT organizations are relying on manual processes that simply can’t keep pace with a rapidly changing threat landscape.

In a survey of 100 network security professionals conducted by Tufin Technologies, a provider of IT security management software, it's clear that the majority of IT organizations are relying on manual IT labor to change firewall rules. That may have been a viable approach once upon a time, but as the volume and complexity of IT security threats continue to increase, it’s pretty clear that manual processes will no longer scale to meet the threat.

More Slideshows:


Seven Steps to Leverage a Counteroffer for a Larger Salary Put yourself in the best position to leverage a counteroffer and win a salary negotiation — or retreat with dignity.

Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.

Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.