Tufin: compliance does not guarantee security
"Complacency is the IT manager's worst enemy, especially when it comes to IT security," said Reuven Harrison, Tufin's chief technology officer.
"This fact was brought home quite clearly at last week's Black Hat security briefings in Las Vegas, at which researchers revealed company after company - and technology upon technology - whose IT security could be compromised," he added.
According to Harrison, as witnessed by the comments of Douglas Merrill, former VP of engineering with Google at Black Hat, if senior managers can become frustrated with an IT architecture, then the same thing can happen further down the management chain.
And when that happens, he says, the firm becomes a breeding ground for IT workarounds that allow staff to work more efficiently, but also allow them to circumvent their own security systems.
As a result of these pressures, having systems in place that check any and all IT security configuration changes for compliance with corporate policies, he explained, is rapidly becoming a critical competent of an efficient security regime.
You can also expect to see these pressures to work more efficiently increase as the effects of the economic situation that many companies now find themselves, said the Tufin CTO.
As a result, he noted, you can begin to understand why, if a company is PCI compliant - as was the case with Heartland Payment Systems - they can still be hit by a data breach.
"Regulatory compliance and best practice certifications are excellent indicators of management quality, but when it comes to security, the acid test is whether multiple layers of security are installed, and are reviewed - as well as tested - on a regular basis," he said.
"This is what security lifecycle management is all about. IT security has now become a state of mind and needs a holistic approach if management is stand a chance of beating the security demons," he added.
Press releases you might also be interested in
Weitere Informationen zum Thema "Security":
So geht das VPN in die Cloud
Sicherheits-Services wie ein Virtual Private Network (VPN) lassen sich heute einfach in die Cloud auslagern. Wichtig ist, sich im Vorfeld über das geforderte Sicherheitsniveau und die Anforderungen und Einsatzumgebungen der Clients klar zu werden und dies für den Cloud-VPN-Provider nachvollziehbar zu dokumentieren. Best Practices für die Auswahl des Providers und den Ablauf des Projekts helfen dabei, schnell und möglichst kostengünstig zum Ziel zu kommen.Weiterlesen