Home

Hybrid IT Management & Security

Hybrid IT Management & Security

Pulse surveys 100 IT and security leaders to find out how they’re managing hybrid IT infrastructure—and keeping data, access, and users secure.

Where are your IT systems currently deployed? (Multi-select)

53%On-premises (in our own data centers)
38%With a managed services provider (MSP)
73%With an Infrastructure-As-A-Service (IaaS) provider (i.e. Amazon AWS, Microsoft Azure, Google GCP)
45%With Software-as-a-Service (SaaS) providers (i.e. Slack, Office 365, Box, Salesforce)
0 views
233 responses

How do you secure access to different asset types (i.e. apps, servers, APIs, and data) and hosting models (i.e. on-prem, MSP, IaaS, SaaS?)

30%We use a different security solution for each asset and hosting type. (i.e. on-prem assets have a different identity management system than cloud assets)
53%We use a unified security solution for modern systems (i.e. SaaS), and a perimeter/network security-based solution for traditional IT components (i.e. on-prem)
9%We have a unified security solution for modern systems and will update the security of traditional IT components—but we don't plan to consolidate the security of modern and traditional systems
8%We have an unified approach to secure systems regardless of asset type and deployment model
1 views
229 responses

Which of the following best describes your security strategy for systems currently hosted on-premises?

41%Network perimeter tools (i.e. VPNs, firewalls, DLP) that secure access to data and inspect traffic
24%Desktop virtualization that fully controls the Operating System & network perimeter tools
17%Adopting SaaS or moving servers to IaaS. The systems staying on-prem will leverage network perimeter tools
18%Consolidating security for both on- and off-prem systems by shifting from 'network perimeter-only' security controls to include device, identity, data, & network context
0 views
227 responses

Security technical debt means how far behind your company is on security maintenance ( i.e. patching existing systems) and increasing security against new threats (i.e. implement modern MFA). How would you best describe how your organization manages security technical debt?

12%We don't
25%We only track security technical debt on a few systems
45%We track and maintain centralized data regarding our security technical debt
18%We track, keep centralized data, and have a corporate strategy around security technical debt
0 views
227 responses

Which of the following statements describe(s) your security technical debt (Multi-select)?

36%We don't have an unified approach for the entire organization
46%Each department keeps its own inventory of systems to upgrade and improve
27%We don’t know which solutions are falling behind on upgrades and patches
23%All our solutions are falling behind on upgrades and patches
29%Only our most complex solutions are falling behind on upgrades and patches (i.e. known risk due to the cost of upgrading security controls)
0 views
226 responses

What's your strategy for securing remote user access to your IT resources?

38%Require VPNs or Virtual Desktops (i.e. VDI, RDP) to enable access & inspect traffic to both internal and cloud-based systems
32%Require Virtual Desktops (i.e. VDI, RDP) to enable access & inspect traffic to both internal and cloud-based systems
11%Use modern network solutions for enabling access to internal systems using dynamic perimeters
19%Use a combination of identity, device management, data, & modern network security controls to secure access dynamically based on risk
1 views
224 responses

Where do you store your employees’, vendors’, and partners’ user data and credentials? (Multi-select)

52%On-premises
55%In the cloud
22%HR system
35%Hybrid environment
0 views
222 responses

Where do you store your customers’ user data and credentials? (Multi-select)

50%On-premises
61%In the cloud
10%HR system
31%Hybrid environment
0 views
222 responses

When it comes to securing systems accessed from and hosted in different locations, which of the following challenges does your team struggle with the most?

18%Our extended threat surface—insufficient security controls, integrated tools, and guidance
33%Insufficient tools—our security stack doesn’t work in modern scenarios, like mobile device access and the remote work environment
23%Lack of integrated tools—our variety of security controls are redundant and add costs and risk
27%Future-proofing security for new initiatives and systems—including centralized security controls and a cohesive user experience
0 views
220 responses

What's your strategy for future-proofing your security for new IT assets?

13%Extend our network perimeter tools to applications outside the network
31%Use our network perimeter security tools for on-prem resources, and implement additional security controls to address off-prem resources
18%Use the network perimeter security tools for on-prem resources, and deploy new security solutions and tactics for off-prem applications
38%Adopt a unified approach for securing systems regardless of where they’re hosted and where the user is located
0 views
203 responses