+1-202-802-9399 (US)
Icon - policies are searched to determine if there is a match to the application

VMworld Survey Report: Complexity biggest obstacle to security tool effectiveness

Given the growing shortage of skilled cyber security staff—and the traditional conflicts between cyber security and IT operations—it’s imperative that cyber security tools not only help to automate key processes, but they must be adopted and embraced by IT Ops people to function effectively. Join Dan Ritch, as he explores the key takeaways from attendees at the 2018 VMworld conference, including:

  •  Recommendations to avoid security tools that are complex to deploy and difficult to use by IT Ops teams.
  • Why cyber security professionals should get input from IT Ops team users when making decisions about which tools to purchase and deploy.
  • The key selection criteria to make PAM, Least Privilege and Application Control tools more effective.

SHARE THIS


The following two tabs change content below.
mm
With a background in IT sales, presales, and technical support, Dan has been working with IT software and security for 6 years. When he is not demoing Secret Server, he helps customers to understand and implement Thycotic software in their environments.
mm

Latest posts by Dan Ritch (see all)

mm

Dan Ritch
With a background in IT sales, presales, and technical support, Dan has been working with IT software and security for 6 years. When he is not demoing Secret Server, he helps customers to understand and implement Thycotic software in their environments.


Watch the Webinar