sincity Posted March 25, 2014 Share Posted March 25, 2014 http://cdn.mos.techradar.com/art/other/Generics/Lock%20image-470-75.jpgThe technology behind network security is evolving all the time, with years of enhancements and continuous intelligence added to security technologies such as firewalls.All this is designed to improve processes and minimise the risk of human error impacting businesses. However, there is one element that limits the effectiveness of the security in any business - the IT manager. A recent firewall survey indicated that 80 percent of companies do not know what all of their firewall rules do. I suggest this is because IT or security managers just cannot easily work with the added complexity of today's technology. Where there is a human involved, there is room for human error. This is not a reflection of the intelligence or expertise of IT managers - they are limited by the capabilities of the human brain.Limits of the human brainThe complexity of firewalls lies in the number of rules and correlation between rulesets. There is a limit to the amount of information that the human brain can digest at once. This means that when an IT manager looks at the management console on his/her computer screen, he or she can only process around 25 rows of rules, when some companies have around 500 rows of rules that are in use at any given time. We can all relate to this, as everyone has experienced an information overload at one time or another, but something needs to be done to stop this affecting business.Security rules and profile rulesets are common in organisations to keep their staff and IT systems safe, both now and in the future. As you can imagine, the higher number of firewall rules a company has, the higher the chance of mis-configuration due to human error. This is because it is extremely difficult for the IT manager running the firewall to keep a clear overview of the organisation's security or easily notice conflicting rulesets. It is unsurprising that over 55 per cent of companies have had a security gap because of a mis-configured firewall rule, with half of those cases resulting in system downtime.500 rules and growingEven if the current rules are working and providing high security levels, there is no guarantee that it will continue to stay this way in the future. However, restricting the number of rulesets is not the way forward. Market dynamics and business requirements change continuously, so there is no way to hold back on adding and changing security rules and settings. Therefore, it is very likely that the number of rules that an IT manager has to contend with will continue to grow. The solutionThe industry needs to step up and come up with an answer to this mismatch between human brain capabilities and the amount of information that technology is providing. For example, when someone studies for a test, they are unable to absorb all the information in a textbook. The solution, for most people, is to take notes, condensing the most important information down into a few key points so the brain can easily absorb it. This is what security technology needs to do for it's users. Developing new security technology has always been a high priority for the industry, but the protection that this technology can offer is limited if they are vulnerable to human error. Ease of use needs to be as a high a priority as innovation, in order for organisations to ensure that their technology is working as effectively as it can. The key is a management console that provides a clear overview of the security rules that have been put in place, and flags the conflicting configurations. This will create and maintain an environment that protects and secures businesses in the best possible way. Klaus Gheri is vice president and general manager of network security, Barracuda Networkshttp://rss.feedsportal.com/c/669/f/415085/s/3894f096/sc/4/mf.gifhttp://res3.feedsportal.com/social/twitter.png http://res3.feedsportal.com/social/facebook.png http://res3.feedsportal.com/social/linkedin.png http://res3.feedsportal.com/social/googleplus.png http://res3.feedsportal.com/social/email.pnghttp://da.feedsportal.com/r/191801933247/u/49/f/415085/c/669/s/3894f096/sc/4/rc/1/rc.imghttp://da.feedsportal.com/r/191801933247/u/49/f/415085/c/669/s/3894f096/sc/4/rc/2/rc.imghttp://da.feedsportal.com/r/191801933247/u/49/f/415085/c/669/s/3894f096/sc/4/rc/3/rc.imghttp://da.feedsportal.com/r/191801933247/u/49/f/415085/c/669/s/3894f096/a2.imghttp://pi.feedsportal.com/r/191801933247/u/49/f/415085/c/669/s/3894f096/a2t.imghttp://feeds.feedburner.com/~r/techradar/software-news/~4/ZzXJ25FIHAw Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.