86% of U.S. and Canadian network and cybersecurity professionals admit to suffering outages, breaches, and more due to internal dysfunction.
TORONTO, Sept. 10, 2018 – BlueCat, the Adaptive DNS company, today announced new research in partnership with International Data Group (IDG) confirming the crippling cost of poor collaboration between network and cybersecurity teams.
The survey, which polled 200 network and cybersecurity professionals across the U.S. & Canada, found almost inevitable consequences for organizations where network and cybersecurity teams have conflicting objectives, are managed in a siloed way, and have unequal or incomplete network visibility.
86% of respondents admitted to experiencing at least one of the following due to a lack of close collaboration:
- Increase in security breaches and/or data loss
- Slow response to security events
- Finger pointing/blame game
- Loss of productivity
- Service downtime
- Inability to determine root cause of security events
- Cost increases
“The findings of this research should mobilize organizations to address some of their most fundamental problems, like team structure, goals, communication, and collaboration,” comments IDG publisher Bob Bragdon. “These teams have to work together much more closely than they ever have before, especially now that cybersecurity has reached a board-level focus.”
Both teams agree they should be collaborating more closely, and understand the payoff to doing so. “The challenge,” explains BlueCat CEO Michael Harris, “is that the network team’s mission is to ensure efficient and accurate traffic flow, while cybersecurity is tasked with inspecting suspicious traffic.” He adds, “these objectives, which sometimes have teams working at cross-purposes, create hurdles to the organization’s overall success. To ensure both the security and functionality of the network, it is imperative network and cybersecurity teams agree upon and manage their responsibilities with common processes, and shared, integrated platforms.”
Teams who already collaborate well report higher preparedness for cybersecurity events, higher levels of trust, and more. Unfortunately, they are a minority. Only 37% of cybersecurity teams report having complete network visibility, making it difficult for teams to get on the same page. The survey also uncovered an industry-wide tug-of-war over ownership of responsibilities like network policy enforcement, proactive threat prevention and detection, and resolution of security events. Meaning, at many companies, the work environment is ripe for work overlaps and fumbled tasks.
Mathew Chase, a seasoned Information Technology executive who was consulted about the findings of this research, confirms this ‘divided house’ is problematic. “I’ve seen this sort of dysfunction act as a source of increased organizational risk firsthand,” Chase says. “Network and cybersecurity teams must start working more closely together—if not, adversaries will continue to exploit this dysfunction, and businesses will suffer.”
To obtain a copy of the research report and learn how other organizations are bringing teams together, visit https://bluecatnetworks.com/pages/download-idg-report-a-house-divided/.
About the Research
Commissioned to IDG Research Services by BlueCat, the survey polled 200 qualified network and cybersecurity professionals across the U.S. and Canada. Respondents range from executive to practitioner-level professionals across a variety of industries and companies.
BlueCat is the Adaptive DNS Company™. The largest global enterprises trust BlueCat to provide the foundation for digital transformation strategies such as cloud migration, virtualization and cybersecurity. Our Adaptive DNS platform makes shared network visibility possible for cybersecurity and network teams, and improves control and compliance across entire networks. This allows organizations to centralize and automate DNS services for security and operational efficiency. For more information, please visit bluecatnetworks.com.
BlueCat Public Relations
Customer situation brief on SUNBURST/Solorigate
Learn more about the attack via the SolarWinds Orion platform and how BlueCat products use DNS to help protect customers against compromises like it.
Sync ServiceNow tickets and IPAM with CMDB Plug-In
With BlueCat’s ServiceNow Configuration Management Database, admins can break the silos between ServiceNow and IPAM to improve IT ticket fulfillment.
On the road to platform hardening, consider a STIG
Security Technical Implementation Guides standardize security configuration on networks, servers, and devices. BlueCat uses them and you can, too.
IT pros debate: Who should own DNS in the cloud?
Six networking pros dig into who should own DNS in the cloud during the third Critical Conversation on Critical Infrastructure hosted in Network VIP.