Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsBanking/Finance/Insurance

SaltStack Report Finds Automation and Alignment are Critical to SecOps Success

Data Security; cyber security news, NIST cybersecurity, data security, data breach, cybersecurity management
May 6, 2020

SaltStack, the creators of intelligent automation for security operations and IT teams, released the findings of its inaugural research survey, The State of XOps Report, Q2 2020. The survey revealed that organizations using software to help IT and InfoSec teams collaborate and align are three times more confident in the effectiveness of their information security efforts. 

Despite the obvious security benefits of improving team alignment, 54 percent of InfoSec leaders say they communicate effectively with IT professionals, while 45 percent of IT professionals agree. This was particularly true among respondents working in the financial services vertical where large enterprise teams struggle to collaborate and communicate to secure digital infrastructure.

The survey findings offer additional insight into communication breakdowns and how teams are working together to fix them. In companies where software is being used to help IT and InfoSec teams collaborate, managers are four times more likely to say their IT and InfoSec teams communicate effectively on important tasks. Moreover, these same organizations are eight times more likely to say their IT and InfoSec teams work together, not just communicate, effectively to secure infrastructure.

The survey did reveal two areas of undeniable alignment between InfoSec and IT professionals:

  • 70 percent of both InfoSec and IT managers say their company sacrifices data security for faster innovation.
  • Both InfoSec and IT managers reported that data protection should be prioritized over innovation, speed to market and cost.

“Even though both IT and InfoSec teams agree security is more important than innovation, DevOps teams are outpacing SecOps teams and we now see rapid innovation with lagging security. This is particularly concerning because it increases the likelihood that infrastructure misconfiguration and known vulnerabilities are more exposed to bad actors,” said Alex Peay, SaltStack SVP of product. “Ultimately, an exploited vulnerability will lead to customer and revenue loss, regulatory violations, and diminished brand trust, which were the most-concerning consequences of a breach to our survey respondents. A security exploit combined with pandemic-induced economic headwinds might be the double black swan scenario that kills a company.” 

SaltStack survey respondents estimated that a major data breach would cost their company roughly $707,000, on average. However, even with such high financial stakes, the rift between InfoSec and IT managers is apparent and persists despite the threat to business. InfoSec managers point at a skills and talent shortage, followed by misconfigured infrastructure and unaddressed vulnerabilities, as the top contributors to risk. IT managers said the highest risk stems from unintentional employee leaks and endpoint attacks.

“A number of recent breaches indicate system misconfiguration and unpatched, known vulnerabilities, particularly of public cloud and on-premises server infrastructure and databases, are the most common cause of data exposure and successful exploits.” said Peay. “There are simply not enough skilled humans to secure digital infrastructure at scale without the force multiplier of security operations automation and improved collaboration among teams. Automation and collaboration are proven to be the difference between a breach, or truly secure digital business.”

Data from The State of XOps Report, Q2 2020 similarly suggests companies that automate security operations eliminate the most tedious and difficult security tasks, as cited by both IT and InfoSec managers, which include:

  • Patch management
  • Vulnerability prioritization
  • Compliance audits

Marc Chenn, CEO of SaltStack, “The survey data in The State of XOps Report, Q2 2020 affirms what we’re hearing from our customers every day. We’re at a tipping point for InfoSec driven by the sheer scale of digital infrastructure adoption by businesses of all stripes. We’re in an all-hands-on-deck situation and it is more important than ever for business to get the most out of their essential security and IT operations teams as they collaborate to fix what’s broken. The alternative is not acceptable. SaltStack SecOps products act as a unifying force for IT and InfoSec teams while ensuring effective, automatic remediation and compliance.”

For additional data and insights, download The State of XOps Report, Q2 2020 today.

KEYWORDS: cyber security financial security information security Information Technology Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber5-900px.jpg

    McAfee Report Finds Automation and Use of Gamification are Key to Cybersecurity

    See More
  • New Report Calls for National Industrial Strategy to Strengthen U.S. Industries that are ‘Too Critical to Fail’

    See More
  • Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

    Why automation, artificial intelligence and machine learning are becoming increasingly critical for SOC operations

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing