Come Together Right Now, IT Operations Teams

If you have been reading our blog series around the 2023 Global Networking Trends Report, you may have noticed two recurring themes.
First, network infrastructure has become more complex, and second, this complexity is calling for a change in the way we operate.
We have changed where we run everything, we have changed the locations of the end users, and we have moved to a flexible model that adapts to changing needs.
For one thing, most organizations have more than one cloud.
The 2023 Global Networking Trends Report shows that 92% of respondents reported using more than one public cloud, and 69% stated they are using more than five software-as-a-service applications.
Most organizations still support the older, static technology models, and at the same time have to adapt to newer technologies such as virtualization, microservices, Kubernetes, and heavier API use-which each come with different network support requirements.
If you needed support, you had to pull in people from different domains, like the network engineer, the desktop support tech, the security experts, the Exchange admin, the database wizard, the business-embedded software engineer, and possibly a third-party vendor or two.
We still see that problem today with IT operations forming silos.
Silos such as cloud, network, and security operations were cited by 40% of our 2023 Global Networking Trends respondents as a top challenge to providing secure access from distributed locations to multiple cloud-based applications.
None of the networking architectural options of the past few years are static.
One call for an onsite, all-hands meeting will bring the networking load and access requirements back into the building for a few hours or even a few days.
IT operations teams need to plan for a dynamic environment that hides each transition from the user.
Given the dynamic nature of networking requirements, the IT operations and security teams need to converge-providing more alignment in their tools, processes, and people.
Cloud networking requirements are different from those in the data center.
A security executive at a global bank once described to me how they made sure all the networking engineers received cloud training.
Not only did that help with operational alignment, but it also opened up more career opportunities for the staff and empowered them to contribute support in more areas.
All IT teams need a seat at the operations table as well as a unified agenda, including IT operations, networking, cloud services, and security professionals.
End users should also have a seat at the table to add their business-side experience and desired outcomes to networking solutions.
As you go on your journey to consolidate and simplify your infrastructure, take this opportunity to bring all your IT operations teams together, along with users, so that the knowledge, skills, and processes in your network environment evolve as well.
The important message here is that people and processes are every bit as important as technology choices; IT operations should never operate in silos again.


This Cyber News was published on feedpress.me. Publication date: Wed, 17 Jan 2024 16:28:03 +0000


Cyber News related to Come Together Right Now, IT Operations Teams

Come Together Right Now, IT Operations Teams - If you have been reading our blog series around the 2023 Global Networking Trends Report, you may have noticed two recurring themes. First, network infrastructure has become more complex, and second, this complexity is calling for a change in the way ...
10 months ago Feedpress.me
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data - A survey of 500 full-time security decision-makers and practitioners published today found that security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams ...
11 months ago Securityboulevard.com
Redefining Cybersecurity for a Comprehensive Security Posture - Cybersecurity is the practice of securing businesses' infrastructure and endpoints from unauthorized access. Multiple teams within an organization lead different aspects of cybersecurity. From Web application firewall to application programming ...
9 months ago Darkreading.com
3 ways to reduce stress on the DevSecOps team - My session focused on the stresses and burnout experienced by security teams, including recent data showing that 94% of chief information security officers suffer from work-related stress, and 65% admit their stress levels compromise their ability to ...
11 months ago Infoworld.com
Innovation With a Security-First Mindset - Technological innovation is moving faster today than ever before. Whether a company is moving with speed to get its innovation into the hands of customers or internal teams, it is critical for product, IT and security teams to be operating in ...
9 months ago Securityboulevard.com
Three security data predictions for 2024 - New and updated regulations, along with increased scrutiny from the SEC, put a strain on governance, risk and compliance teams to manage an organization's security, risk and compliance posture. At the end of the day, security teams' jobs are to ...
11 months ago Helpnetsecurity.com
Legit Posture Score empowers security teams to measure and manage their AppSec posture - Help Net Security - This new feature further enhances the Legit ASPM platform, providing security and development teams with the ability to measure, compare, and improve their application security posture over time, ensuring their software factories and applications in ...
1 month ago Helpnetsecurity.com
Do More with Security Orchestration, Automation, and Response - Today, security operations center teams face dual challenges of acquiring both the right caliber and quantity of staff. With this gap, it's important for SOC teams to consider security, orchestration, automation and response solutions to automate ...
10 months ago Securityboulevard.com
Infosec products of the month: May 2024 - The Third-Party Intelligence module combines vendor-specific cyber threat intelligence with cybersecurity posture data from suppliers' tech environments, exposing a critical blind spot for security teams. Synopsys Polaris Assist automates repetitive, ...
5 months ago Helpnetsecurity.com
Want to Justify Your IT Investments Faster? Measure Business Outcomes. - Achieving strategic business outcomes in today's fast-paced digital climate is a key imperative. Digital transformation, better customer experiences, increased productivity, and cost savings are rated as the most important business outcomes, ...
10 months ago Feedpress.me
How to converge networking and security teams: Key steps - Organizations are always searching for ways to clean up their processes, improve their incident response capabilities and provide more reliable network services. One way to do that is to converge networking and security teams. One of the first ...
5 months ago Techtarget.com
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
5 months ago Therecord.media
5 Tips for Strengthening the Developer-Security Team Relationship - COMMENTARY. In the ever-evolving realm of software development, the interaction between developers and security teams is critically important, with security analysts typically depending on developers to address vulnerabilities in previously written ...
10 months ago Darkreading.com
Cato Unveils Industry First AI-driven Networking and Security Incident Detection and Response - Cato Networks, the leader in SASE, announced the addition of network incident detection and response tools to the Cato SASE Cloud platform. With Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and ...
8 months ago Itsecurityguru.org
Cato Unveils Industry First AI-driven Networking and Security Incident Detection and Response - Cato Networks, the leader in SASE, announced the addition of network incident detection and response tools to the Cato SASE Cloud platform. With Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and ...
8 months ago Itsecurityguru.org
Cato Unveils Industry First AI-driven Networking and Security Incident Detection and Response - Cato Networks, the leader in SASE, announced the addition of network incident detection and response tools to the Cato SASE Cloud platform. With Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and ...
8 months ago Itsecurityguru.org
Cato Unveils Industry First AI-driven Networking and Security Incident Detection and Response - Cato Networks, the leader in SASE, announced the addition of network incident detection and response tools to the Cato SASE Cloud platform. With Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and ...
8 months ago Itsecurityguru.org
Enhancing firewall management with automation tools - Help Net Security - In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. Firewall rule ...
1 month ago Helpnetsecurity.com
Splunk Joins Cisco: Our Partner Ecosystems Just Got Even Stronger - We're looking forward to this exciting new chapter of our journey together - and it couldn't have come at a better time. In today's digital world, organizations need to connect the people, places, apps, data, and devices that power their business, ...
8 months ago Feedpress.me
Rethinking DevOps: A New Era - Emerging technologies, evolving methodologies, and changing business needs are redefining what it means to implement DevOps practices effectively. With the incorporation of AI and ML, DevOps processes have become more adaptive and intelligent. In ...
8 months ago Feeds.dzone.com
CISO Corner: CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout - Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Boards of directors don't care about a security program's minute technical details. With the US Securities and ...
9 months ago Darkreading.com
Cisco Training Bootcamps: Get the Scoop from Subject Matter Experts - Cisco Training Bootcamps have been on the scene for a couple years now. Plus, we got a sneak peek at what they'll cover in the upcoming Cisco Training Bootcamp webinar on December 13, 2023, at 10 a.m. Pacific Time. A Cisco Training Bootcamp provides ...
11 months ago Feedpress.me
6 insights from Microsoft's 2024 state of multicloud risk report to evolve your security strategy - This is the first time Microsoft has released a report sharing key insights across aspects of cloud security, including identity and data. These threats and more are the driving forces behind Microsoft's work to advance cybersecurity protections by ...
5 months ago Microsoft.com
DevSecOps: Definition, Benefits and Best Practices - DevSecOps is an approach that focuses on the alignment of the three core pillars of DevOps — Development, Operations, and Security. It’s a combination of processes, tools and practices designed to enable organizations to adopt innovative and ...
1 year ago Heimdalsecurity.com
Cloudflare Report Surfaces Lots of API Insecurity - A report published by Cloudflare today finds machine learning algorithms employed by the content delivery network provider found 31% more REST application programming interface endpoints than its customers have self-reported. More than 15,000 ...
10 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)