Report: Differing views on the state of network security

Share
A new report has found that IT leaders are confident in their organisation’s network security, but IT managers have doubts

Network security remains an issue for some organisations despite the confidence of IT leaders. A possible explanation, according to network visibility provider Forward Networks, is disjointed communication and the lack of visibility into organisational networks. 

Data from a commissioned survey conducted by IDG on behalf of Forward Networks in July 2021 shows that 70% of IT leaders strongly agree that their network architecture follows a zero-trust approach, compared to just 53% of IT managers who feel the same.

 

Different opinions on the state of network security 

The disconnect between executives and front-line IT managers was also apparent in responses related to network security initiatives and overall security health. For example, while 59% of executives said their organisations were building or already employing zero-trust architectures, just 39% of IT managers said the same. In addition, more than half (58%) of executive respondents rated their overall network security as ahead of the curve compared to their competitors, while another third (37%) said it was on par with others. At the same time, only 48% of managers rated their security ahead of competitors, while nearly half (47%) rated it on par.

"The disconnect between the perceptions of security executives and practitioners highlights the lack of visibility into the network and security policy adherence," said Chiara Regale, Vice President, Product Management, Forward Networks. "Without a single source of network truth, practitioners and executives are forced to make inferences. Having the ability to prove compliance and easily visualise security policies in action can eliminate the disconnect and ensure that the bulk of engineering effort is directed toward proactively improving the network security posture instead of fighting fires or clarifying confusing data."

 

A mixture of confidence and challenges

Despite their high confidence levels, IT decision-makers reported widespread challenges when ensuring that their network is secure.

  • 81% struggle to identify the depth of a breach
  • 69% are unable to quickly identify when something is out of compliance
  • 71% cited the inability to obtain endpoint-to-endpoint connectivity analysis, and
  • 68% indicated knowing what devices are in the network and its topology is challenging.

Survey respondents also said they are seeking to improve multiple areas of network security management for greater efficiency.

  • 88% want real-time monitoring capabilities
  • 85% are seeking diligent compliance with all security protocols
  • 73% want validation that their network architecture follows a zero-trust approach
  • 85% are seeking improvement in network-breach response times.

"In a perfect world, IT could spend all of its attention coming up with innovative ways to stay ahead of technology's evolution while also making sure that their organisation has the optimal IT and network infrastructure to support the business," added Regale. "But this is not the world we live in. IT leaders spend a lot of time putting out fires related to increasingly sophisticated cyberattacks, and the only way to minimise the risks associated with these breaches is to have full visibility across the entire IT infrastructure."

 

Share

Featured Articles

Nvidia: Bringing AI to Container Security

Nvidia has launched a NIM Blueprint for container security that offers analysis of common vulnerabilities in just seconds

Intelliworx MD on Why SME's Need to Evaluate Their Security

Intelliworx Managing Director Shane Maher explains how SMEs are being shown to underestimate their need for cybersecurity, often to disastrous effects

Cysurance & 360 SOC: What Cyber Warranties Bring Fintechs

Cysurance and 360 SOC's partnership combines cybersecurity solutions with warranty and insurance coverage to give financial protection in case of an attack

Cybersecurity & Sustainability: Capgemini Shows the Synergy

Cyber Security

Clumio: Examining Commvault’s Object Storage Recovery Tool

Cloud Security

Top 10 Apps for Cybersecurity

Application Security