SHARE
Facebook X Pinterest WhatsApp

Why Firms’ Network Security Plans Need Re-evaluation

Why Firms’ Network Security Plans Need Re-evaluation Blinded by Limited Visibility 64% of respondents report that manual processes, lack of visibility into security policies and poor management practices are the biggest challenges to network security. Communications Roadblock 18% of respondents said aligning plans for development, security and operations is their biggest obstacle. That’s up from […]

Written By
thumbnail Gina Roos
Gina Roos
Apr 24, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Why Firms’ Network Security Plans Need Re-evaluation

Blinded by Limited VisibilityBlinded by Limited Visibility

64% of respondents report that manual processes, lack of visibility into security policies and poor management practices are the biggest challenges to network security.

Communications RoadblockCommunications Roadblock

18% of respondents said aligning plans for development, security and operations is their biggest obstacle. That’s up from 9% in both 2012 and 2013.

Failure Is Not an OptionFailure Is Not an Option

56% of respondents said their organizations experienced one or more outages in the last year due to security infrastructure misconfiguration, while 26% did not know how many outages they had.

Risky BusinessRisky Business

The majority of organizations struggle with identifying security vulnerabilities, and 45% said their biggest challenges are understanding them in the context of their businesses or getting the business unit to fix the problem.

Owning the RiskOwning the Risk

60% of organizations said their data centers run more than 50 critical business applications, with 20% of organizations managing more than 500 apps and 15% responsible for more than 1,000 apps. Nearly all respondents said business stakeholders should “own the risk” of their applications.

Insider JobInsider Job

73% of organizations said accidental data leakage or malicious breaches by insiders is the No. 1 risk. That’s up from 62% in 2013.

Third-Party Security Poses RiskThird-Party Security Poses Risk

Half the respondents who outsource the management of security controls or sensitive data were less than confident about their provider’s ability to provide protection. Only 12% were very confident.

Cloudy With a Chance of RiskCloudy With a Chance of Risk

Although more than two-thirds of respondents said they have migrated some apps to a public cloud and 73% have migrated some apps to a private cloud, security remains a big issue. In fact, 37% said maintaining security is the biggest challenge with migration.

Consolidation HeadachesConsolidation Headaches

When consolidating data centers, 53% of respondents said they had security concerns with application connectivity; 39% said ensuring the right access for authorized personnel was their biggest concern, followed by 29% who said ensuring apps can run is their biggest issue.

Easing the PainEasing the Pain

More than two-thirds of organizations have implemented next-generation firewalls that incorporate intrusion-protection systems, application control, URL filtering and advanced malware detection. While improved protection was the biggest reason for security adoption, 29% upgraded their firewalls to enable bring-your-own-device practices.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.