Author Topic: Toward Enterprise Security Technology Integration  (Read 26 times)

0 Members and 1 Guest are viewing this topic.

Offline Chubb

  • Freebies and Good Deals Mod
  • Administrator
  • *
  • Posts: 66724
  • .: Freebie King
Toward Enterprise Security Technology Integration
« Reply #1 on: May 02, 2017, 05:18:41 PM »
Toward Enterprise Security Technology Integration
2 May 2017, 4:39 pm



Last week, I posted a blog about the move toward cybersecurity vendor and technology consolidation along with a growing emphasis on technology integration in the enterprise. 

Here’s some additional data that reinforces these conclusions.  As part of a recent ESG research project, 176 cybersecurity and It professionals were presented with several statements and asked whether they agreed or disagreed with each one (note: I am an ESG employee).  Here are the results: 

82% of survey respondents “strongly agree” or “agree” with the statement: ‘My organization is actively building a security architecture that integrates multiple individual product.’  This is likely part of a SOAPA (i.e. security operations and analytics platform architecture) project.

81% of survey respondents “strongly agree” or “agree” with the statement: ‘Cybersecurity product integration has become an important consideration of our security procurement criteria.’  In other words, stand-alone point tools don’t make the purchasing cut in most cases.

78% of survey respondents “strongly agree” or “agree” with the statement: ‘The security products my organization buys are regularly qualified on their integration capabilities.  This aligns with the previous point. 

73% of survey respondents “strongly agree” or “agree” with the statement: ‘My organization tends to select best-of-breed products.’  Once again, the data reflects that best-of-breed functionality AND integration capabilities are critical.

Why the focus on integration and architecture?  There is an element of simplifying purchasing and vendor management, but most CISOs want tools that work together so they can improve security prevention/detection while streamlining operations.  Remember that most organizations don’t have enough skilled cybersecurity professionals so CISOs are fixated on getting more effectiveness and efficiency out of their security technologies as soon as possible. 

To read this article in full or to leave a comment, please click here



Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<

 


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2018 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by DSTM & PseFrank

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified Log / Malware Analysis & Removal Help and System Health Checks