Tuesday, 7th April 2020

Complexity clouds security effectiveness

Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. Thycotic’s report stemming from the VMworld survey was designed to help overcome the obstacles that divide IT operations and cybersecurity functions and promote better security practices for all organizations.

According to the findings, even though IT operations personnel help influence the selection of cyber security tools, nearly two out of three say complexity in deployment (30 percent) and complexity in daily use (34 percent) are the biggest hindrances in security tool effectiveness.

“Security tools that are complex to deploy and difficult to use on a daily basis can negatively impact the tool’s effectiveness,” said Joseph Carson, chief security scientist at Thycotic. “If IT Ops does not adopt and even embrace a security tool, it risks becoming a waste of time and money while failing to adequately protect critical information assets.”

Additional findings from the survey revealed that IT Ops were involved in implementing a wide variety of cybersecurity solutions over the past year---an indication of how essential they are to the “people” and “process” roles of a successful security strategy.Nearly half the respondents cited involvement in antivirus/antimalware tools and multi-factor authentication projects while another one third listed vulnerability scanning, privileged access management, and removing administrator privileges.

When asked specifically about the most important attributes for privileged account management tools, survey participants cited “Easy to Deploy” as No. 1 (26 percent) just ahead of Automation (25 percent) - along with Integration with other technologies (11 percent) and a Cloud deployment option (10 percent). For least privilege enforcement tools, Easy to Deploy (23 percent) was considered the most desirable attribute, closely followed by automation (21.5 percent), and a cloud deployment option (15 percent).

Venafi has published the results of a survey of 485 IT security professionals attending RSA Conferen...
Nutanix has published the healthcare industry findings of its second annual Enterprise Cloud Index R...
New location tracking capabilities mitigate risks of company data being unwillingly exposed; lowers...
FireMon has released its 2020 State of Hybrid Cloud Security Report, the annual benchmark of the clo...
Two 4SECURail teams aim to design a Computer Security Incident Response Team (CSIRT) for joint EU-Ra...
Although GDPR has produced a massive shift in personal data protection, European countries are faced...
Security operations teams face challenges in understanding how their security tools work leading to...
Huntsman Security’s “Essential 8 Scorecard” wins “Best compliance product” and “Best SME security pr...