Money spent on cyber-security wasted if firewalls don't work properly
Money spent on cyber-security wasted if firewalls don't work properly

Most IT professionals say firewalls are a core security component and that third-party management of multi-vendor environments is crucial.

A survey conducted by FireMon at the RSA Conference collected responses from 350 IT security pros on the importance of firewalls in the fight against data breaches.

Most (72 percent) IT professionals agree that no matter how much money is spent on cyber-security, it is wasted if the firewalls are not properly configured.

More than half (52 percent) experienced a firewall configuration change that opened a potential security breach which caused business downtime.

“We often hear that ‘the firewall is dead' and an array of security ‘solutions' have cropped up in this wake, but it is clear from this study that is most definitely not the case,” said Michael Callahan, CMO at FireMon. “The problem is compounded when you think about how many organisations have tens or even hundreds of firewalls as part of their security defences – all of which need to be configured. This creates a gap between the security environment complexity and the resources to manage it where mistakes are likely to occur and risk increases.”

In a world where the consequences of having an insecure security system can be catastrophic and leave enterprises vulnerable to cyber-threats, FireMon believes the key to closing this gap is more effective management of security solutions.

Business downtime or interruption costs can significantly impact trade and income, but the greatest cost can sometimes be a company's reputation. Customers don't want to work with a brand that puts their data at risk, which proves why it is so important for security systems to be fully functional and free from exploits.

“Incorporating robust, intelligent security management can greatly reduce all the complexity that surrounds the IT security infrastructure. It can help identify specific weak points within the firewall and avert any potential breach within a system,” said Callahan.