Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

DH2i Pre-Pandemic State of VPNs Survey Reveals Inadequate Security Number One VPN Pain Point

  • Most Surprising Finding: Almost 40% of Respondents Believed Their Network Had Already Been Breached by Bad Actor(s)

DH2i, the leading provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, announced the results of its premier Virtual Private Network (VPN) survey of IT professionals across small-, mid- and enterprise-sized organizations. To qualify, the respondent had to be using a VPN for network access and/or security measure. The survey findings revealed that universally, respondents advised that using a VPN created a number of problems for their organization. Topping the list, 62% of respondents cited inadequate security as their number one VPN pain point.

The goal of the research, conducted prior to the COVID-19 stay-at-home guidance, was to understand the challenges being faced by IT professionals charged with deploying and managing VPNs, as well as what new capabilities they would find beneficial. The next phase of this research, already underway, will examine how today’s work from home (WFH) paradigm has shifted the data security and VPN landscape.

Recommended AI News: InGen Dynamics to Continue to Diversify Application of A.I and Robotics Technologies

The Pre-Pandemic State of Virtual Private Networks (VPNs) Report Highlights:

–  The top three use cases: remote user access (83%), site-to-site connections (57%) and site-to-cloud and/or cloud-to-cloud connections (48%).

–  The top three VPN vendors: CISCO (663%), Palo Alto Networks (22%) and Check Point (12%).

Related Posts
1 of 15,255

–  The top five pain points: security (62%), performance (45%), cost (46%), manageability (44%) and reliability for DR (48%).

–  The most surprising finding: Almost 40% of respondents believed their network had already been breached by a bad actor(s).

The full report deeply analyzes each of the aforementioned topics, details the survey methodology and presents an analysis on the future of VPNs.

“It was indeed surprising to have almost 40% of those responsible for keeping ransomware and other malware from penetrating their network, believe that in fact, it already had. And, while this survey was completely anonymous, we believe that this number is actually even higher – as some respondents would likely prefer not to admit it, even to themselves,” said Don Boxley, CEO and Co-Founder of DH2i. “We expect this number to grow during the next research phase, given the rise in bad actors during the past year that were looking to exploit data security vulnerabilities as a result of the pandemic.”

Recommended AI News: Server at Work Rebrands as SAW.IT

“To take a step back, at the start of this research, our goal was to better understand the current challenges being faced by IT professionals responsible for their network security, particularly those using VPNs, and to solicit their feedback on what improvements, features, functionality and capabilities they viewed as ideal in a next-gen VPN or competitive solution,” said Boxley. “It is interesting to note that at the end of the day, recognizing the limitations of current VPNs, 86% of respondents were inclined to consider an alternative if the other solution could prove superiority across several factors including security, configuration and management, cost, performance and availability. Specifically, 89% of the respondents indicated that they prefer a substitute to their current VPNs if given the ability to easily limit remote users’ access to specific applications or services without creating a network attack surface.”

“Of course, as we were analyzing the results of our initial research, the pandemic hit, and countless individuals found themselves trying to navigate the challenges of a work from home scenario – including how to gain access to their organization’s applications and information. Simply gaining access was the priority for most workers. However, for IT ensuring that their employees not only had uninterrupted access, but that it was secure on both ends, and everywhere in-between, pushed other alternative remote access IT initiatives to the back burner,” Boxley continued. “While it provided immense and immediately actionable insight, we knew that this research would need to be considered a phase 1, given the cataclysmic shift that was taking place. We look forward to sharing the results of our phase 2 research shortly.”

Recommended AI News: Banjo Health Inc. Announces Partnership with ELMCRx Solutions

Leave A Reply

Your email address will not be published.