Network vs Cybersecurity: Can’t We All Just Get Along?

In our latest cinematic endeavor, we dive into the minds of two seriously fed up network and cybersecurity professionals.

If the video below triggered something in you, then we apologize. Perhaps your organization could benefit from a little therapy as well? When network and cybersecurity teams struggle to work together, then everybody suffers. 

Won’t somebody think of the coworkers?



In a recent report from IDG, the complex dynamics between network and cybersecurity teams were thoroughly explored. One large finding was that an astounding 86% of surveyed organizations have suffered repercussions due to lack of collaboration between the two groups. 

Two major consequences of this clash are increased security breaches and data loss, and it goes even deeper than that: these teams also report a slow response to security events (34%), service downtime (27%) and more.

How can we ensure that organizations feel prepared to protect the network against future threats when the folks in charge can’t seem to agree? Increasing trust and understanding is a huge must. There’s a tug of war over responsibilities, and this leads to a vicious cycle of missed threats, finger pointing and an inevitable scramble to fix the issue. This might sound like an incredibly daunting undertaking – but there’s hope.

While a business’ network teams may be struggling to get along, 82% of network and 92% of cybersecurity professionals understand that fighting is getting them nowhere, fast. This is highlighted by the fact that in organizations that do have cooperating teams, there are loads of benefits, including better network visibility for the cybersecurity team, and an overall higher level of mutual trust. 

The key component to note here is visibility: our survey showed that organizations that provide complete visibility to cybersecurity staff end up with a higher level of confidence that they are very well-equipped when protecting the network when the need arises.

Unfortunately, only 37% of cybersecurity respondents mentioned that they have this level of visibility. In order to get this change underway, we need to understand what these teams are feeling and going through. 

Unsure of where to start? Our upcoming webinar on September 27, How Internal Dysfunction Is Putting Your Network At Risk, is a great option. This webinar will feature IDG’s Bob Bragdon, and BlueCat’s Director of Product Marketing Darren McPhee, in a discussion on the findings of the report, and what organizations can do to help bring network and cybersecurity teams together.


An avatar of the author

Hilary has worked as a copywriter in digital advertising and the FinTech startup world. She is now working as a Digital Copywriter at BlueCat and learning more every day.

Related content

Banner announcing BlueCat's acquisition of LiveAction, displaying both logos and the phrase "We're about to get bigger."

BlueCat acquires LiveAction to drive network modernization and optimization

BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Read more

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

BlueCat has acquired LiveAction

It’s official! BlueCat has acquired LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.