cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
Interviews, IT and Technology News India | CXO VOICE
No Result
View All Result
Home News Cyber Security

Security Policy Automation, APAC ahead of USA and EMEA

News Desk by News Desk
October 29, 2018
Reading Time: 3 mins read
Security Policy
Share on FacebookShare on TwitterShare on Linkedin

October 29, 2018 – According to global survey conducted by Osterman Research, Understanding Security Processes and the Need to Automate, APAC is ahead of the US and EMEA in terms of automation for processes involved in the management of firewall rules and security policy. The survey, which includes responses from 465 senior security leaders at large enterprises in the US, EMEA and APAC, reveals trends in the use of security automation, as well as artificial intelligence (AI) and machine learning (ML). Survey questions focused on workflows in firewall and security policy management and vulnerability management.

APAC is substantially ahead in using AI/ML in production as compared to USA and EMEA where the rate of adoption is still in early days, with few organizations using AI/ML in production — just 4% of respondents in EMEA, 9% in the U.S.”Many organizations have significant deficiencies with regard to their firewall and security management,” said Michael Osterman, Principal Analyst of Osterman Research. “Most realize that they need to improve the way they manage security and policy, and they also realize that automating workflows and processes is key to these improvements.”

A few interesting trends from the survey:

  • Cost is critical but not for APAC, only 35 percent in APAC ranked costs as the key driver for automation. They instead ranked the difficulty of managing the size and complexity of their network as the primary reason (43 percent), as well as being able to move skilled staff off mundane activities to higher value/skill security tasks (40 percent).
  • Better visibility and context are still one of the key concerns when it comes to APAC. Organizations are still deficient in understanding network context and having visibility of firewall and security policy, including why firewall rules exist. 47 percent in APAC said they had only “minimal or some understanding.” 39 percent in APAC said they have only minimal or some understanding of how security changes impact their business: And it appears that identifying vulnerabilities continues to be a challenge, with 42 percent in APAC having only minimal or some understanding of what vulnerabilities exist on network devices.
  • Security staff are bogged down with incident response processes, compliance management and making changes to the security infrastructure. Compliance management and security changes were noted as the top time takers for APAC.
  • Security teams need help, with most organizations admitting they need to make major improvements in how they manage security and policy. The biggest improvements are needed in how organizations decommission applications: 54 percent in APAC say they do it “poorly or moderately.” Ironically, these are areas where automation can make a huge impact.
  • Automation is an impetus for cloud migration. It’s no surprise that for many companies, migration to thecloud is having a significant impact on the automation of security policy changes. This is most notable in APAC where 43 percent of organizations said cloud is impacting the automation of security policy changes. Survey results also show that the clear majority of organizations are working on initiatives focused on security automation to support cloud environments.

While the journey to understand the key drivers for Security Automation continues, the good news is that security leaders have started on their automation journey. “Security leaders are facing a tough time balancing organization risk and value from automating. Though there are many areas, where it is essential to implement automation — and, in fact, where automation reduces risk. For example, collecting/gathering data for attack surface visibility and modeling, network change management and rule life cycle management. Networks are simply becoming too large and complex to manage manually,” said Gerard Sillars, VP-APAC, Skybox Security. If you’re not already working with a vendor in these areas, you should start looking for one.

Click here to download the full report

You May Would Like to Read:

ABB’s Robotics Factory Where Robots Make Robots

Tags: AIAPACEMEAMLOsterman ResearchSecurity PolicySecurity Policy AutomationSkybox Security
News Desk

News Desk

by CXO VOICE team memebrs, contact@cxovoice.com

Related Posts

Semiconductor Companies
Business

Top 10 Semiconductor Companies by Revenue, Worldwide

April 26, 2022
AI adapatation 2020
AI

IIT Madras partners with TCS to offer M-Tech course in Industrial AI

March 22, 2022
AI In The Banking And Financial
AI

10 Benefits of AI In The Banking And Financial Sector

March 21, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Tech Mahindra
AI

Tech Mahindra Join Hands with Yellow.ai to Transform Enterprise Customer Experiences

February 7, 2022
UX Designing Product Security
Cyber Security

How UX Designing Strengthens Product Security and Improves ROI

December 13, 2021
AI Software Market
AI

Global AI Software Market to Reach $62.5 billion in 2022

November 23, 2021
AI, Blockchain and IOT Together To Bring Real Value to Organizations
AI

AI, Blockchain and IOT Together To Bring Real Value to Organizations

October 1, 2020
Load More
Next Post
ibm and red hat

IBM to Acquire Multinational Software Company Red Hat for $34 billion

ADVERTISEMENT

Expert Views

Jaganathan Chelliah
Technology

Installing CCTV Cameras? Here is What You Need to Know

May 17, 2022
Wipro's Digital Database Services (DDS)
Banking

Cloud trends in the BFSI sector set to drive digital transformation in the new financial year

April 26, 2022
Cloud Data Protection
Cyber Security

Data Protection, a Key Part of Business Continuity

April 18, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Data Modernisation
Technology

4 Key Trends Driving Data Modernization Across The Enterprises

January 28, 2022

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Enterprises, and MSMEs IoT
Leaders Talk

IoT is now seen as an essential enabler for the enterprises to be future ready : Joyjeet Bose

-
Security While Working Remotely interview with Filip Coftas
Cyber Security

Security While Working Remotely [Interview]

-
Akita Security Device Help you Protect your Security During COVID-19 [Interview with Zakir Hussain]
COVID-19

Can Akita Security Device Help you Protect your Security During COVID-19 [Interview]

-
digital transformation and customer experience Newgen software
Interview

Digital Transformation Journey helps Newgen Software Improve Customer Experience [Interview]

-

Entrepreneur

Top 10 Richest Persons In India

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXO VOICE is a premier resource for the enterprises, SMBs and Startups CXOs and business leaders, It enables CXOs and business executives gain access key insights, experts views, analysis, business strategy, and leaders interviews on what’s happening in the market and its impact.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com

Newsletter

Subscribe to our mailing list to receives newsletter direct to your inbox!

  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2022 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security

© 2022 CXO VOICE