">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Tuesday, January 19, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Businesses at Risk Due to Unidentified Network Traffic

Milcah Lukhanyu by Milcah Lukhanyu
3 years ago
in Tech
9 min read
0

Sophos, today announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45 percent of their organization’s network traffic.

In fact, nearly one-in-four cannot identify 70 percent of their network traffic. The lack of visibility creates significant security challenges for today’s businesses and impacts effective network management. The survey polled more than 2,700 IT decision makers from mid-sized businesses in 10 countries including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa.

Considering the debilitating impact cyber-attacks can have on a business, it’s unsurprising that 84 percent of respondents agree that a lack of application visibility is a serious security concern. Without the ability to identify what’s running on their network, IT managers are blind to ransomware, unknown malware, data breaches and other advanced threats, as well as potentially malicious applications and rogue users. Network firewalls with signature-based detection are unable to provide adequate visibility into application traffic due to a variety of factors such as the increasing use of encryption, browser emulation, and advanced evasion techniques.

“If you can’t see everything on your network, you can’t ever be confident that your organization is protected from threats. IT professionals have been ‘flying blind’ for too long and cybercriminals take advantage of this,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “With governments worldwide introducing stiffer penalties for data breach and loss, knowing who and what is on your network is becoming increasingly important. This dirty secret can’t be ignored any longer.”

On average, organizations spend seven working days remediating 16 infected machines per month. Smaller organizations (100-1,000 users) spend on average five working days remediating 13 machines, while larger organizations (1,001-5,000 users) spend on average 10 working days remediating 20 machines per month, according to the survey.

“A single network breach often leads to the compromise of multiple computers, so the faster you can stop the infection from spreading the more you limit the damage and time needed to clean it up,” said Schiappa. “Companies are looking for the kind of next-generation, integrated network and endpoint protection that can stop advanced threats and prevent an isolated incident from turning into a widespread outbreak. Sophisticated exploits such as MimiKatz and EternalBlue reminded everyone that network protection is critical to endpoint security and vice versa. Only direct intelligence sharing between these two can reveal the true nature of who and what is operating on your network.”

IT managers are very aware that firewalls need an upgrade in protection. In fact, the survey revealed that 79 percent of IT managers polled want better protection from their current firewall. 99 percent want firewall technology that can automatically isolate infected computers, and 97 percent want endpoint and firewall protection from the same vendor which allows for direct sharing of security status information.  

Related posts

Tatu City Partners with Konza to Attract Investors to Kenya

January 19, 2021
0
searchengineland.com

SEO for Beginners: Where to Start and What You Need

January 19, 2021
0

Why Dota 2 Viewership Is Going Up

January 19, 2021
0
pregnant woman kenyan

Nakuru County Has Introduced Smart Watches That Will Monitor Expectant Mother

January 19, 2021
0

Security is Not the Only Risk to Businesses

Following security risks, lost productivity was cited as a concern for 52 percent of respondents when it comes to a lack of network visibility. Business productivity can be negatively impacted if IT is unable to prioritize bandwidth for critical applications.

For industries that rely on custom software to meet specific business needs, an inability to prioritize these mission critical applications over less important traffic could be costly. 50 percent of IT professionals who had invested in custom applications admitted that their firewall could not identify the traffic and therefore were unable to maximize their return on investment. Lack of visibility also creates a blind spot for the potential transfer of illegal or inappropriate content on corporate networks, making companies vulnerable to litigation and compliance issues.

“Organizations need a firewall that protects their investment in business-critical and custom applications by allowing employees to have prioritized access to the applications they need,” said Schiappa. “Increasing network visibility requires a radically different approach. By enabling the firewall to receive information directly from the endpoint security, it can now positively identify all applications – even obscure or custom applications.”

The Dirty Secrets of Network Firewalls survey results are available in a PDF report.

The Dirty Secrets of Network Firewalls survey was conducted by Vanson Bourne, an independent specialist in market research, in October and November 2017. This survey interviewed 2,700 IT decision makers in 10 countries and across five continents, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa. All respondents were from organizations of between 100 and 5,000 users.

 

Readers 1,350

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Tech

Tatu City Partners with Konza to Attract Investors to Kenya

January 19, 2021
0
searchengineland.com
Tech

SEO for Beginners: Where to Start and What You Need

January 19, 2021
0
Tech

Why Dota 2 Viewership Is Going Up

January 19, 2021
0
pregnant woman kenyan
Tech

Nakuru County Has Introduced Smart Watches That Will Monitor Expectant Mother

January 19, 2021
0
Social media

A Non-Profit American Organization Is Demanding For Telegram To Be Removed From The Apple Store

January 19, 2021
0
Business

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
0
Tech

Use these smart TV security tricks to protect your privacy

January 18, 2021
0
A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi
Mobile

How To Measure How Much You Walk On Your iPhone

January 17, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Nigeria’s uLesson raises $7.5m series A for expansion into Eastern & Southern Africa

January 19, 2021

Huawei’s connected ecosystem sets the building blocks for the upcoming connected future

January 19, 2021

Tatu City Partners with Konza to Attract Investors to Kenya

January 19, 2021

4 Science-Backed Benefits of Having a Dog

January 19, 2021
searchengineland.com

SEO for Beginners: Where to Start and What You Need

January 19, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: