Skip to content

NetOps and SecOps Collide

Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets.

Study Highlights:

Network team role in security increases:

Over 80% of network teams play a role in security efforts including investigations and clean-up, implementation and configuration of security tools, and proactive threat-hunting.

Security presents multiple challenges:

correlation with network performance, breach containment verification, and data/visibility gaps top the list.

Problem domain isolation remains top obstacle:

55% struggle to determine problems are caused by the network, system, or application.

​Thank you to VIAVI Solutions for the article.

Related Posts

WiFi and LAN network testing with Candela Technologies

WiFi and LAN network testing with Candela Technologies

WiFi and LAN networks are the backbone of modern businesses, and testing them is essential to prevent outages, optimize performance,…
How to Upgrade an Old School Clock System Without Breaking the Bank

How to Upgrade an Old School Clock System Without Breaking the Bank

Upgrading your old clock system can seem like a costly endeavor—between equipment, installation, and potential downtime, the expenses can add…
Mastering Time Outdoors: Sapling & Bodet Clock Solutions

Mastering Time Outdoors: Sapling & Bodet Clock Solutions

Outdoor clocks are a fantastic way to enhance the exterior of any property, whether it’s a commercial building, a public…
The Value of Network TAPs in Enterprise IT

The Value of Network TAPs in Enterprise IT

Explore how Network TAPs offer superior traffic visibility, reliability, and security over SPAN ports and other solutions for effective network…
Cybereason vs. CrowdStrike, SentinelOne, Microsoft Defender, Trellix: A Head-to-Head Comparison

Cybereason vs. CrowdStrike, SentinelOne, Microsoft Defender, Trellix: A Head-to-Head Comparison

As cyber threats evolve, Canadian businesses need a cybersecurity solution that goes beyond traditional endpoint protection. Cybereason has emerged as…