Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

The Lockdown

Thycotic’s Cyber Security Blog

IT Operations Teams Say Complexity is Biggest Obstacle to Security Tool Effectiveness

Written by Jordan True

October 16th, 2018

VMworld 2018 Conference Attendee Survey Highlights Cyber Security Concerns and Preferences by IT Ops

WASHINGTON, D.C., October 16, 2018 Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today released the findings from its 2018  VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. Thycotic’s report stemming from the VMworld survey was designed to help overcome the obstacles that divide IT operations and cyber security functions and promote better security practices for all organizations.

According to the findings, even though IT operations personnel help influence the selection of cyber security tools, nearly two out of three say complexity in deployment (30 percent) and complexity in daily use (34 percent) are the biggest hindrances in security tool effectiveness.

“Security tools that are complex to deploy and difficult to use on a daily basis can negatively impact the tool’s effectiveness,” said Joseph Carson, chief security scientist at Thycotic. “If IT Ops does not adopt and even embrace a security tool, it risks becoming a waste of time and money while failing to adequately protect critical information assets.”

Additional findings from the survey revealed that IT Ops were involved in implementing a wide variety of cybersecurity solutions over the past year—an indication of how essential they are to the “people” and “process” roles of a successful security strategy.  Nearly half the respondents cited involvement in antivirus/antimalware tools and multi-factor authentication projects while another one third listed vulnerability scanning, privileged access management, and removing administrator privileges.

When asked specifically about the most important attributes for privileged account management tools, survey participants cited “Easy to Deploy” as No. 1 (26 percent) just ahead of Automation (25 percent) – along with Integration with other technologies (11 percent) and a Cloud deployment option (10 percent). For least privilege enforcement tools, Easy to Deploy (23 percent) was considered the most desirable attribute, closely followed by automation (21.5 percent), and a cloud deployment option (15 percent).

“Recognized as a top cyber security priority in 2018 by analyst firm Gartner, Privileged Account Management is fast becoming a priority for cyber security and IT Ops teams at many organizations, as seen from the results,” added Carson. “With more than 80 percent of breaches today involving compromised credentials among IT and business users, IT operations teams must ensure the business stays up and running smoothly so that workers can get the information they need, when they need it.”

To view additional findings from Thycotic’s 2018 VMworld Cyber Security report, download the report now.


Like this post?

Get our top blog posts delivered to your inbox once a month.