Tuesday, 17th September 2019
Logo

Complexity clouds security effectiveness

Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. Thycotic’s report stemming from the VMworld survey was designed to help overcome the obstacles that divide IT operations and cybersecurity functions and promote better security practices for all organizations.

According to the findings, even though IT operations personnel help influence the selection of cyber security tools, nearly two out of three say complexity in deployment (30 percent) and complexity in daily use (34 percent) are the biggest hindrances in security tool effectiveness.

“Security tools that are complex to deploy and difficult to use on a daily basis can negatively impact the tool’s effectiveness,” said Joseph Carson, chief security scientist at Thycotic. “If IT Ops does not adopt and even embrace a security tool, it risks becoming a waste of time and money while failing to adequately protect critical information assets.”

Additional findings from the survey revealed that IT Ops were involved in implementing a wide variety of cybersecurity solutions over the past year---an indication of how essential they are to the “people” and “process” roles of a successful security strategy.Nearly half the respondents cited involvement in antivirus/antimalware tools and multi-factor authentication projects while another one third listed vulnerability scanning, privileged access management, and removing administrator privileges.

When asked specifically about the most important attributes for privileged account management tools, survey participants cited “Easy to Deploy” as No. 1 (26 percent) just ahead of Automation (25 percent) - along with Integration with other technologies (11 percent) and a Cloud deployment option (10 percent). For least privilege enforcement tools, Easy to Deploy (23 percent) was considered the most desirable attribute, closely followed by automation (21.5 percent), and a cloud deployment option (15 percent).

Findings reveal that 37% of respondents have reported an incident to the ICO in the past 12 months,...
Nearly one-third (32%) of IT group employees in SMBs and mid-market enterprises globally said their...
Two-thirds of enterprises are s.truggling to embed security in the enterprise-IT architecture
Ping Identity has published two new white papers from its CISO Advisory Council on securing customer...
While only a third say regulatory change triggers purchase of new technology.
Respondents identify people as biggest source of cyber threats, with Facebook and BA as most notable...
Research reveals that companies investing in the latest cyber security products and services are ris...
New levels of industry collaboration will protect and secure people, processes and technology.