SHARE
Facebook X Pinterest WhatsApp

Convoluted Security Processes Hamper Productivity

Apr 22, 2014

Convoluted Security Processes Hamper Productivity

Convoluted Security Processes Threaten ProductivityConvoluted Security Processes Threaten Productivity

Manual processes, limited visibility into security policies, and poor change management practices are the greatest challenges to managing network security, according to 66% of respondents.

Out-Of-Process Changes IncreaseOut-Of-Process Changes Increase

More than 80% of respondents report network or application outages due to out-of-process changes, up from over 50% in 2012.

Insiders, Third-Parties Pose Security RisksInsiders, Third-Parties Pose Security Risks

75% of respondents rate accidental data leakage and malicious insider behavior as their main risks, up from 66% last year.

A Crisis of ConfidenceA Crisis of Confidence

50% of respondents who outsource the management of security controls or sensitive information are not confident in their provider’s ability to protect their data.

Cloud Adoption RisingCloud Adoption Rising

Despite concerns about productivity and security, slightly more than 15% of respondents use cloud hosting for most of their applications.

Poor Communication HurtsPoor Communication Hurts

20% of respondents cite poor communication as existing across development, security and operations groups, more than double the increase from last year.

Critical Applications Reside in Data CentersCritical Applications Reside in Data Centers

Three in five respondents say their data center includes more than 50 critical business apps. One in five respondents is responsible for more than 500 business apps.

A Plethora of Apps Obscures VulnerabilitiesA Plethora of Apps Obscures Vulnerabilities

The majority of organizations struggle to identify vulnerabilities and understand them in the context of their business. Almost all respondents say business stakeholders should manage the risks of their own applications.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.