{"id":800,"date":"2006-10-02T00:00:00","date_gmt":"2006-10-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/eu-biz-mired-by-complex-security-systems\/"},"modified":"2021-12-30T11:38:11","modified_gmt":"2021-12-30T11:38:11","slug":"eu-biz-mired-by-complex-security-systems","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/eu-biz-mired-by-complex-security-systems\/","title":{"rendered":"EU.biz mired by complex security systems"},"content":{"rendered":"<p>A study commissioned by security software company McAfee reveals a desire for easier management of IT security is being undermined by complex security system purchasing strategies.   Despite IT managers demanding a single view of IT security, too many security suppliers, solutions, and management consoles are weighing down businesses with unnecessary complications, McAfee claims.  Just over a third of businesses have five or more security solutions deployed, while one in five (22 per cent) enterprises questioned have seven or more different solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses need to look at integrated security solutions under a single console which deliver protection against a full range of threats while at the same time being cost effective and easy to manage,&#8221; said McAfee&#8217;s European director of system security Aminah Gianfrancesco.<\/p>\n<p>One of the main difficulties for businesses with multiple software solutions from a variety of vendors is keeping the whole security shebang up-to-date, and this means managing the deployment of patches.<\/p>\n<p>Italian businesses are the biggest patchers with 67 per cent admitting to deploying patches at least once a day, closely followed by German businesses.  Regardless of multiple IT security systems, only 23 per cent of respondents said they are completely satisfied with the level of security across their systems and network.<\/p>\n<p>http:\/\/www.theregister.co.uk\/2006\/10\/02\/eu_biz_security_confusion\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-800","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/800\/revisions"}],"predecessor-version":[{"id":3287,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/800\/revisions\/3287"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}