New Survey: Half of IT Professionals Make Undocumented Changes to IT Systems

Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime

April 18, 2014

3 Min Read


IRVINE, Calif., April 15, 2014 – Netwrix Corporation, the #1 provider of change and configuration auditing software, today released results of a new survey which finds that a surprising majority (57%) of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT change management controls in place. Frequent system changes without documentation or audit processes can cause system downtime and security breaches from internal and external threats while decreasing overall operational efficiency. 

The Netwrix survey, “2014 State of IT Changes,” collected data from 577 IT professionals in organizations across multiple industries in a range of sizes. Key study findings show that of the respondents:

·       65% have made changes that caused services to stop

·       52% make changes that impact system downtime daily or weekly

·       39% have made a change that was the root cause of a security breach

·       40% make changes that impact security daily or weekly. Interestingly, industries with higher regulations are making changes that impact security more often, including healthcare (44%) and financial (46%).

·       62% have little or no real ability to audit the changes they make, revealing serious gaps in meeting security best practice or compliance objectives

·       Just 23% have an auditing process or change auditing solution in place to validate changes are being entered into a change management solution

“This data reveals that IT organizations are regularly making undocumented changes that impact system availability and security,” said Michael Fimin, CEO, Netwrix. “This is a risky practice that may jeopardize the security and performance of their business. IT managers and CIOs need to evaluate the addition of change auditing to their change management processes. This will enable them to ensure that all changes – both documented and undocumented – are tracked so that answers can be quickly found in the event of a security breach or service outage.”

“With roughly 90% of outages being caused by failed changes, visibility into IT infrastructure changes is critical to maintaining a stable environment.  Change auditing is also foundational to security and compliance requirements,” said David Monahan, Research Director, Security and Risk Management, Enterprise Management Associates. “Auditing changes in enterprise class environments requires the ability to get a high level strategic view without sacrificing the tactical system level detail and insight extended throughout the whole system stack. Netwrix Auditor excels at acquiring information from a broad coverage of Windows and ESX based systems, including systems that don’t generate native audit trails. The product collects alerts in a non-intrusive way providing insights to those changes with a consolidated reporting engine.”

Netwrix Auditor is an affordable change and configuration auditing platform that enables complete visibility into the entire IT infrastructure by auditing changes made to security configurations, systems and data. This increases security, assists with compliance and increases business continuity.  For more information or to download a free trial, visit:

To download a complete copy of the “2014 State of IT Changes” Netwrix survey, please visit:

About Netwrix Corporation

Netwrix Corporation is the #1 provider of change and configuration auditing software, offering the most simple, efficient and affordable IT infrastructure auditing solutions with the broadest coverage of audited systems and applications available today. Founded in 2006, Netwrix software is used by more than 160,000 organizations worldwide, and is ranked in the Top 100 US software companies in the 2013 Inc. 5000 and Deloitte Technology Fast 500. For more information, visit


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights