In what can well be termed as a backlash against complexity, a majority of
users surveyed across Indian enterprises have said that management complexities
such as multiple security vendors and multiple passwords are the top pain points
for them.
In a survey of 1,213 users across India, as many as 58 percent of users have
identified managing solution with multiple security vendors as a pain area. An
almost equal number of users-56 percent to be accurate-see multiple passwords
for authentication as a pain point. Complexity in managing security issues,
complex security environment leading to loss of productivity, and restrictive
desktop procedures have emerged as the other top-of-mind issues for IT users in
a survey conducted by Microsoft and Cross Tab. The results have been shared
exclusively with Dataquest.
'Check Noise, Make Noise'
Most users identified with the problem of multiple security vendors as
having solutions from multiple vendors meant that there will be different
implementation stages, updates, licenses and different configurations.
Password management has been another key challenge where more than 50 percent
of the respondents complained of log-in attempt failures. Different compliance
initiatives have led the organization to enforce strong password policies, but
remembering those passwords is increasingly becoming a challenge.
Many users who were surveyed also complained that a lot of effort goes into
solving issues related to security solutions. Security issues that are too
complicated to handle decrease the overall IT efficiency of the organization. 52
percent of respondents felt that IT security management is extremely difficult
to handle and a lot of time is spent in solving these issues.
The end users realized that they are burdened with too many security
compliances. This problem was linked with the authentication process involved or
other related issues. There are a lot of 'Dos' and 'Don'ts' in an organization,
especially when it comes to installing a software. More than 50 percent users
were burdened with too many security compliances in the organization.
A little less than half (47 percent) the respondents were frustrated with the
total hours wasted by the end users because of security management issues,
leading to the loss of productivity.
Finally, users also cited the problem that there are a lot of restrictions
when it comes to desktop security procedures, which often do not allow
installation of applications, chat services, social networking tools, etc.
Increasingly, some of these are used for doing business. Lack of access to these
tools, hence, becomes frustrating for any frontline executive.
Lowering the Noise
A set of strategies are recommended in response to the survey. These
recommendations would have a positive impact on the users and the decision
makers to implement an effective IT infrastructure. The report suggests that
there has to be vendor consolidation to have less dependency on multiple
vendors. A simple and single solution would also allow easy deployment and
alignment with the internal IT infrastructure.
A less regulatory and less compliance pressure can also lead to simple
authentication steps. An effective security solution should be implemented that
increases the performance and productivity of the organization, while also
understanding the user's needs by not imposing too many restrictions on software
and application installations.
Richard Clarke, ex-cyber security advisor, White House once said, "If you
spend more on coffee than on IT security, you will be hacked. What's more, you
deserve to be hacked." Lets analyze this: How much spending does an IT decision
maker do in your organization when it comes to investing in solutions for
information security and data confidentiality? Well, the numbers could be
staggering high, but the fact is that the IT decision makers over a period of
time have realized the importance of a much wanted consolidated solution that
could address their overall concerns and grievances regarding data security.
The technology landscape will grow to become more and more complex.
Organizations need to look for an integrated IT environment which would be less
time consuming and more cost effective. Organizations need to have innovative
security systems for optimum and easy management and seamless integration.
Hopefully, the decision of IT spending on security would be wiser and more
effective in the days to come. Current IT environment might be reasonably well
secured, but is there a business ready security solution that would be able to
provide an end-to-end protection apart from the cost benefit? Any security
vendor to address this issue?
PC Suraj
Source: DQ