INFOGRAPHIC
INFOGRAPHIC
CISOs say end-users are
frustrated that security
disrupts productivity
B
romium, the pioneer and leader in
virtualisation-based enterprise security,
has announced the findings of an
independent survey showing IT security
is hindering productivity and innovation
across enterprises. The research revealed
most security teams utilise a ‘prohibition
approach’ – i.e. restricting user access to
websites and applications – a tactic which is
hampering productivity and innovation while
creating major frustration for users.
“At a time when competition is fierce, the risk
of falling behind and being less productive is
as big a risk to an enterprise as cyberattacks.
Security has to enable innovation by
design, not act as a barrier to progress.
Sadly, traditional approaches to security
32
INTELLIGENTCIO
are leading to frustrated users, unhappy
CISOs and strained relationships between
workers and IT departments – all of which
stifles business development, innovation
and growth,” said Ian Pratt, President and
Co-Founder of Bromium.
The research, based on a survey of 500
CISOs from large enterprises in the US (200),
UK (200) and Germany (100), is part of a
wider report on the role of the end-user in
cybersecurity. Key findings include:
• 88% of enterprises prohibit users from
using websites and applications due to
security concerns; with 94% investing in
web proxy services to restrict what users
can and can’t access.
• Unsurprisingly, these restrictions negatively
impact user experience: 74% of CISOs
said users have expressed frustration that
security is preventing them from doing
their job and 81% said that users see
security as a hurdle to innovation.
• Security could also be impacting
customer’s relationships and deals, as
CISOs report that they receive complaints
at least twice a week that work has been
held up by over-zealous security tools.
• As a result, IT help desks are spending an
average of 572 hours a year responding
to user requests and complaints
regarding access to websites.
All this frustration is creating an uneasy
relationship between IT, security and the
www.intelligentcio.com