Topmost Security Concern for IT Users: Multiple Vendors
In what can well be termed a backlash against complexity, a majority of users surveyed across Indian enterprises have said that management complexities such as multiple security vendors and multiple passwords are the top pain points for them.
In a survey of 1213 users across India, as many as 58% of users have identified managing solutions with multiple security vendors as a pain area for them. An almost equal number of users-56% to be accurate-see multiple passwords for authentication, as a pain point. Complexity in managing security issues, complex security environment leading to loss of productivity, and restrictive desktop procedures have emerged as the other top-of-mind issues for IT users, in a survey conducted by Microsoft and Cross Tab. The results have been shared exclusively with Dataquest.
Here are some more findings from the survey called Check Noise, Make Noise
Most users identified with the problem of multiple security vendors as having solutions from multiple vendors meant that different implementation stages, updates, licenses & different configurations.
Password management has been another key challenge where more than 50% of the respondents complained of log-in attempt failures. Different compliance initiatives have led the organization to enforce strong password policies, but remembering those passwords is increasingly becoming a challenge.
Many users surveyed also complained that IT security management is a tough task and a lot of effort goes into solving issues related to security solutions. Security issues that are too complicated to handle decreases the overall IT efficiency of the organization. 52% felt IT security management is extremely difficult to handle and lot of time is spent in solving these issues.
The end-users realized that they are burdened with too many security compliance. This problem was linked with the authentication process involved or other related issues. There are a lot of 'Do's and Dont's' in an organization specially when it comes to installing a software. More than 50% users were burdened with too much security compliance in the organization.
A little less than half (47%) the respondents were frustrated with the total hours wasted by end-users because of security management issues, leading to loss of productivity.
Finally, users also cited the problem that there are a lot of restrictions when it comes to desktop security procedures, which often does not allow installation of applications, chat services, social networking tools etc. Increasingly, some of these are used for doing business. Lack of access to these tools, hence, becomes frustrating for any frontline executives.
Lowering the Noise
A set of strategies are recommended in response to the survey. These recommendations would have a positive impact on the users and the decision makers to implement effective IT infrastructure. The report suggests that there has to be a vendor consolidation to make less dependency on multiple vendors. A simple and single solution would also allow easy deployment and alignment with the internal IT infrastructure.
A less regulatory and less compliance pressure can also lead to simple authentication steps. An effective security solution should be implemented that increases the performance and productivity of the organization, while also understanding the user needs by not imposing too many restrictions on software and application installations.
Richard Clarke, Ex-Cyber Security Advisor, White House once said, “If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked.” Lets analyze this: How much spending does an IT decision maker do in your organization when it comes to investing in solutions for information security and data confidentiality? Well, the numbers could be staggering high but the fact is that the IT decision makers over a period of time have realized the importance of a much wanted consolidated solution that could address their overall concerns and grievances regarding data security.
The technology landscape will grow to become more and more complex. Organizations need to look forward for an integrated IT environment which would be less time consuming and more cost effective. Organizations need to have innovative security systems for optimum and easy management and seamless integration. Hopefully the decision of IT spending on security would be wiser and more effective in the days to come. Current IT environments might be well reasonably secured but is there a business ready security solution that would be able to provide an end-to-end protection apart from cost benefit? Any security vendor to address this issue?
In a survey of 1213 users across India, as many as 58% of users have identified managing solutions with multiple security vendors as a pain area for them. An almost equal number of users-56% to be accurate-see multiple passwords for authentication, as a pain point. Complexity in managing security issues, complex security environment leading to loss of productivity, and restrictive desktop procedures have emerged as the other top-of-mind issues for IT users, in a survey conducted by Microsoft and Cross Tab. The results have been shared exclusively with Dataquest.
Here are some more findings from the survey called Check Noise, Make Noise
Most users identified with the problem of multiple security vendors as having solutions from multiple vendors meant that different implementation stages, updates, licenses & different configurations.
Password management has been another key challenge where more than 50% of the respondents complained of log-in attempt failures. Different compliance initiatives have led the organization to enforce strong password policies, but remembering those passwords is increasingly becoming a challenge.
Many users surveyed also complained that IT security management is a tough task and a lot of effort goes into solving issues related to security solutions. Security issues that are too complicated to handle decreases the overall IT efficiency of the organization. 52% felt IT security management is extremely difficult to handle and lot of time is spent in solving these issues.
The end-users realized that they are burdened with too many security compliance. This problem was linked with the authentication process involved or other related issues. There are a lot of 'Do's and Dont's' in an organization specially when it comes to installing a software. More than 50% users were burdened with too much security compliance in the organization.
A little less than half (47%) the respondents were frustrated with the total hours wasted by end-users because of security management issues, leading to loss of productivity.
Finally, users also cited the problem that there are a lot of restrictions when it comes to desktop security procedures, which often does not allow installation of applications, chat services, social networking tools etc. Increasingly, some of these are used for doing business. Lack of access to these tools, hence, becomes frustrating for any frontline executives.
Lowering the Noise
A set of strategies are recommended in response to the survey. These recommendations would have a positive impact on the users and the decision makers to implement effective IT infrastructure. The report suggests that there has to be a vendor consolidation to make less dependency on multiple vendors. A simple and single solution would also allow easy deployment and alignment with the internal IT infrastructure.
A less regulatory and less compliance pressure can also lead to simple authentication steps. An effective security solution should be implemented that increases the performance and productivity of the organization, while also understanding the user needs by not imposing too many restrictions on software and application installations.
Richard Clarke, Ex-Cyber Security Advisor, White House once said, “If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked.” Lets analyze this: How much spending does an IT decision maker do in your organization when it comes to investing in solutions for information security and data confidentiality? Well, the numbers could be staggering high but the fact is that the IT decision makers over a period of time have realized the importance of a much wanted consolidated solution that could address their overall concerns and grievances regarding data security.
The technology landscape will grow to become more and more complex. Organizations need to look forward for an integrated IT environment which would be less time consuming and more cost effective. Organizations need to have innovative security systems for optimum and easy management and seamless integration. Hopefully the decision of IT spending on security would be wiser and more effective in the days to come. Current IT environments might be well reasonably secured but is there a business ready security solution that would be able to provide an end-to-end protection apart from cost benefit? Any security vendor to address this issue?
Comments
Post a Comment