SlideShare a Scribd company logo
1 of 8
Executive Summary

This Information Security survey is an initiative to help IT professionals and decision makers
across industries to hear voices of concern regarding prevailing information security; its system
and procedures. All the responses and feedback are collected from people who have made
noise on information security system bugs.

This November 2009 survey was conducted nationwide and a total of 1213 users participated in
this survey across various industries.

According to the survey, there are several painful issues surrounding security systems. The
survey found that among the 1213 surveyed users, around 2/3rd have experienced noticeable
extremely painful problems, another 1/5th have reported somewhat painful problems, and rest
1/5th say they can live with these issues. There may be many security systems in the market
today with a lot of promising features, however, users have revealed the painful areas and have
created a loud noise about it. Nation-wide high security threats have spurred the need to
safeguard mission critical information systems. Thus, this scales up the demand for cutting edge
security solutions which are not only very simple to use but are hassle-free. Most organizations
are eagerly waiting to have innovative security systems for optimum and easy management and
seamless integration.
It is loud and clear- Information Security                                Overview: Whom did we
systems are giving users an ache                                       survey and who made noise?

Information Security is not new technology, but the way                 1213 Participated in the Survey
information security is accessed, managed, and delivered is
constantly evolving.


The IT security solutions market in India is growing. There has also
been strong growth in the service provider and software markets.


Data security and privacy, along with the need to protect IT
infrastructure from the ever increasing sophisticated targeted
attacks are among the key drivers fuelling the growth of IT security
spending .


However with the growth of IT security software spends, there has          Users across India shared
also been an increase in the users’ concerns which leaves them                  their pain points
completely bugged!




Users are troubled by Information Security Solutions:

Cross-tab conducted a study among those who have faced problems with the Information
security solutions at present or in past and tried to understand the underlying problems.


   1. The study revealed that prime issue faced by the industry today is with multiple security
       vendor solutions in an IT environment. 53% cited this as an “extremely frustrating
       problem” and 15% voiced it as “big enough,” while the issue did not matter to the
rest 32%. Owing to the growing need of advanced multi featured security products and
   services, users tend to seek help from numerous vendors. However, users are unhappy
   with the fact that each comes with its own updates releases, license agreements and
   different quality of support.




                  Fig 1. Pain points and security issues in order of ranking



2. Password management challenge is next to follow. 52% of the participants
   complained that it was extremely annoying to face „log-in attempts failures‟,
   coupled with apprehension of "Is it something I did wrong”. 17% cited it as
   annoying and 31% did not seem to get bothered with this issue. Nevertheless,
   compliance initiatives have led the organizations to enforce strong password policies,
   often needing to use multiple passwords and remembering those is a challenge.


3. Security issues that are too complicated to handle seem to be the third most
   frustrating problem. This in turn decreases the overall IT efficiency of the
   organization. 52% felt IT security management is extremely difficult to handle and
   lot of time is spent in solving these issues. For another 16%, this issue mattered to
   an extent and rest did not seem to get affect with the complications involved in the
   Security issues.
4. Another problem that was cited next was with do’s and
       don'ts associated with the security issues. This problem          Overview: whom did we
       was most linked with the authentication process involved          survey and who made noise?
       or other related issues. 51% were highly burdened with            IT professionals, end users and
       too many security compliance issues, 16% were                     decision makers across India
       somewhat burdened and rest seem to be unaffected.                 shared their pain points (fig 2)
       Most cited issues around the do‟s and don‟ts are
       inability to install software.


   5. Another closely linked problem is the amount of productive hours spent in managing
       IT administration. 47% were highly frustrated with the several hours spent in
       security management.


   6. Lastly, users have cited the problem that the desktop security procedures are too
       restrictive. 49% are highly annoyed with this restriction, while 16% are moderately
       affected with it.



Users across industries are bugged
Audiences from IT, IT-telecom hardware and IT-telecom software sectors were concerned due to
multiple security vendors operating the organization. IT managers and consultants are also
concerned. Additionally, users in IT administrative role find it most difficult to manage
passwords. Medium and Enterprise Business segments users have also expressed their concerns
over these security issues and are extremely frustrated. IT and Engineering sectors as well feel
pressed by so many security rules, more so among IT Managers and Consultants.
24%                                                                Maha         KA

                                                                       AP           TN

                                                                       WB           Guj

          16%                                                          Haryana      UP

                                                                       KL            Punjab

                                                                       Raj          Uttar

                                                                       PM           Goa
                6% 6%
                        5%
                                                                       OR            Jhar
                             4%
                                  3% 3%
                                          1% 1% 1% 1%
                                                      1% 1% 1% 1%




Fig 2. Incidence of users from several states across India who participated in the survey.
IT Administration

IT

IT Telecom- Hardware
                                                  17%           17%
                                                          15%
IT telecom- Software                        12%
                                                                          9%   8%     8%   8%
Electronics                                                                                      6%

Engineering

Export/Import                                                Industry Sectors

Bank/Insurance/Finance

Health care



                      Fig 3. Incidence of users across industry sectors




                                                                   IT Administrators
                                                                   IT Supervisors/Advisors/Purchase Officers
                                                                   IT Managers/ Consulants
                                                                   Managers/Assistant Managers
                           21%
                                                                   Senior Managers/ IT Head
     13%            13%           14%
              11%                                                  Director/GM/CEO/CIO/Owner
                                        10% 10%
                                                                   Others




                        Role



                    Fig 4. Incidence of users from various roles in the IT industry
Organizations should adopt ways to address this noise

Most organizations look forward to an integrated IT environment which takes less time to
manage and also saves money. A benefit solution strategy for all businesses!


Following are the recommendations to address the various “noise-levels” pertaining to
Information Security Systems.


A Comprehensive Information security solution is needed as a single solution:
   Security solutions need to be simple
   Management should be simplified
   There is also a need for vendor consolidation and less dependency on multiple vendors.


Other much needed security solution strategies are:


   Less regulatory and compliance pressure leading to complex authentication steps
   Easy deployment and alignment with internal IT infrastructure
   Less time to be spent on maintenance
   Effective performance which in turn improves organization’s productivity
   Understands users need and is not too restrictive



The current IT environments are reasonably secured now but there is a need for Business Ready
Security Solutions. This will provide an edge to the organization, which implements it. It will also
provide an end-to-end protection and cost –savings.

For more information on how you can benefit from Business Ready Security Solutions
from Microsoft visit: http://www.microsoft.com/brs

More Related Content

What's hot

Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?- Mark - Fullbright
 
Cost of a lost laptop white paper final 3
Cost of a lost laptop white paper final 3Cost of a lost laptop white paper final 3
Cost of a lost laptop white paper final 3ankit.das
 
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01Vicky Makhija
 
3 B View Survey Results 2010
3 B View Survey Results 20103 B View Survey Results 2010
3 B View Survey Results 2010Ges Ray
 
Curvature's State of the Third-Party Maintenance Market
Curvature's State of the Third-Party Maintenance MarketCurvature's State of the Third-Party Maintenance Market
Curvature's State of the Third-Party Maintenance MarketCurvature
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Communications
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperCasey Lucas
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Kyriba Corporation
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 

What's hot (15)

Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Cost of a lost laptop white paper final 3
Cost of a lost laptop white paper final 3Cost of a lost laptop white paper final 3
Cost of a lost laptop white paper final 3
 
Ccs16
Ccs16Ccs16
Ccs16
 
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
 
3 B View Survey Results 2010
3 B View Survey Results 20103 B View Survey Results 2010
3 B View Survey Results 2010
 
Views about Automation
Views about AutomationViews about Automation
Views about Automation
 
Security services in noida redscorpionsecurity.in
Security services in noida redscorpionsecurity.inSecurity services in noida redscorpionsecurity.in
Security services in noida redscorpionsecurity.in
 
Curvature's State of the Third-Party Maintenance Market
Curvature's State of the Third-Party Maintenance MarketCurvature's State of the Third-Party Maintenance Market
Curvature's State of the Third-Party Maintenance Market
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013Rogers Connected Workplace report 2013
Rogers Connected Workplace report 2013
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security Whitepaper
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 

Similar to IT users share pain points with security systems

The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryCompTIA
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfMichelleTartalio
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNEL
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNELBEYOND “IT” – OPPORTUNITIES FOR THE CHANNEL
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNELPartner Talk
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey ResultsPrecisely
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey ResultsTony Fish
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryEmisor Digital
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-resultsAccenture
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similar to IT users share pain points with security systems (20)

The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNEL
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNELBEYOND “IT” – OPPORTUNITIES FOR THE CHANNEL
BEYOND “IT” – OPPORTUNITIES FOR THE CHANNEL
 
2019 Data Trends Survey Results
2019 Data Trends Survey Results2019 Data Trends Survey Results
2019 Data Trends Survey Results
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

IT users share pain points with security systems

  • 1.
  • 2. Executive Summary This Information Security survey is an initiative to help IT professionals and decision makers across industries to hear voices of concern regarding prevailing information security; its system and procedures. All the responses and feedback are collected from people who have made noise on information security system bugs. This November 2009 survey was conducted nationwide and a total of 1213 users participated in this survey across various industries. According to the survey, there are several painful issues surrounding security systems. The survey found that among the 1213 surveyed users, around 2/3rd have experienced noticeable extremely painful problems, another 1/5th have reported somewhat painful problems, and rest 1/5th say they can live with these issues. There may be many security systems in the market today with a lot of promising features, however, users have revealed the painful areas and have created a loud noise about it. Nation-wide high security threats have spurred the need to safeguard mission critical information systems. Thus, this scales up the demand for cutting edge security solutions which are not only very simple to use but are hassle-free. Most organizations are eagerly waiting to have innovative security systems for optimum and easy management and seamless integration.
  • 3. It is loud and clear- Information Security Overview: Whom did we systems are giving users an ache survey and who made noise? Information Security is not new technology, but the way 1213 Participated in the Survey information security is accessed, managed, and delivered is constantly evolving. The IT security solutions market in India is growing. There has also been strong growth in the service provider and software markets. Data security and privacy, along with the need to protect IT infrastructure from the ever increasing sophisticated targeted attacks are among the key drivers fuelling the growth of IT security spending . However with the growth of IT security software spends, there has Users across India shared also been an increase in the users’ concerns which leaves them their pain points completely bugged! Users are troubled by Information Security Solutions: Cross-tab conducted a study among those who have faced problems with the Information security solutions at present or in past and tried to understand the underlying problems. 1. The study revealed that prime issue faced by the industry today is with multiple security vendor solutions in an IT environment. 53% cited this as an “extremely frustrating problem” and 15% voiced it as “big enough,” while the issue did not matter to the
  • 4. rest 32%. Owing to the growing need of advanced multi featured security products and services, users tend to seek help from numerous vendors. However, users are unhappy with the fact that each comes with its own updates releases, license agreements and different quality of support. Fig 1. Pain points and security issues in order of ranking 2. Password management challenge is next to follow. 52% of the participants complained that it was extremely annoying to face „log-in attempts failures‟, coupled with apprehension of "Is it something I did wrong”. 17% cited it as annoying and 31% did not seem to get bothered with this issue. Nevertheless, compliance initiatives have led the organizations to enforce strong password policies, often needing to use multiple passwords and remembering those is a challenge. 3. Security issues that are too complicated to handle seem to be the third most frustrating problem. This in turn decreases the overall IT efficiency of the organization. 52% felt IT security management is extremely difficult to handle and lot of time is spent in solving these issues. For another 16%, this issue mattered to an extent and rest did not seem to get affect with the complications involved in the Security issues.
  • 5. 4. Another problem that was cited next was with do’s and don'ts associated with the security issues. This problem Overview: whom did we was most linked with the authentication process involved survey and who made noise? or other related issues. 51% were highly burdened with IT professionals, end users and too many security compliance issues, 16% were decision makers across India somewhat burdened and rest seem to be unaffected. shared their pain points (fig 2) Most cited issues around the do‟s and don‟ts are inability to install software. 5. Another closely linked problem is the amount of productive hours spent in managing IT administration. 47% were highly frustrated with the several hours spent in security management. 6. Lastly, users have cited the problem that the desktop security procedures are too restrictive. 49% are highly annoyed with this restriction, while 16% are moderately affected with it. Users across industries are bugged Audiences from IT, IT-telecom hardware and IT-telecom software sectors were concerned due to multiple security vendors operating the organization. IT managers and consultants are also concerned. Additionally, users in IT administrative role find it most difficult to manage passwords. Medium and Enterprise Business segments users have also expressed their concerns over these security issues and are extremely frustrated. IT and Engineering sectors as well feel pressed by so many security rules, more so among IT Managers and Consultants.
  • 6. 24% Maha KA AP TN WB Guj 16% Haryana UP KL Punjab Raj Uttar PM Goa 6% 6% 5% OR Jhar 4% 3% 3% 1% 1% 1% 1% 1% 1% 1% 1% Fig 2. Incidence of users from several states across India who participated in the survey.
  • 7. IT Administration IT IT Telecom- Hardware 17% 17% 15% IT telecom- Software 12% 9% 8% 8% 8% Electronics 6% Engineering Export/Import Industry Sectors Bank/Insurance/Finance Health care Fig 3. Incidence of users across industry sectors IT Administrators IT Supervisors/Advisors/Purchase Officers IT Managers/ Consulants Managers/Assistant Managers 21% Senior Managers/ IT Head 13% 13% 14% 11% Director/GM/CEO/CIO/Owner 10% 10% Others Role Fig 4. Incidence of users from various roles in the IT industry
  • 8. Organizations should adopt ways to address this noise Most organizations look forward to an integrated IT environment which takes less time to manage and also saves money. A benefit solution strategy for all businesses! Following are the recommendations to address the various “noise-levels” pertaining to Information Security Systems. A Comprehensive Information security solution is needed as a single solution:  Security solutions need to be simple  Management should be simplified  There is also a need for vendor consolidation and less dependency on multiple vendors. Other much needed security solution strategies are:  Less regulatory and compliance pressure leading to complex authentication steps  Easy deployment and alignment with internal IT infrastructure  Less time to be spent on maintenance  Effective performance which in turn improves organization’s productivity  Understands users need and is not too restrictive The current IT environments are reasonably secured now but there is a need for Business Ready Security Solutions. This will provide an edge to the organization, which implements it. It will also provide an end-to-end protection and cost –savings. For more information on how you can benefit from Business Ready Security Solutions from Microsoft visit: http://www.microsoft.com/brs