One Article Review

Accueil - L'article:
Source Anomali.webp Anomali
Identifiant 4446501
Date de publication 2022-04-14 11:00:00 (vue: 2022-04-14 11:06:34)
Titre More is Less: The Challenge of Utilizing Multiple Security Tools
Texte Greetings everyone, and welcome to this week’s blog. This week, I’m diving into number six in our “Top 10 List of the Challenges Cybersecurity Professionals Face,” as found in our Cybersecurity Insights Report 2022: The State of Cyber Resilience: Lack of integrated cyber-security solutions. To deal with the cyberthreats they face every day, Enterprise Security Decision Makers seek new and well-supported solutions. They look for solutions that are easy to use and integrate with other cybersecurity systems and different parts of their organizations. 44% of those surveyed said that easily integrating with other cybersecurity tools is essential when evaluating cybersecurity solutions. What do you look for?   initIframe('62573c84d0742a0929d79352');   So why do almost half of enterprise decision-makers want easily integrated tools? Enterprises frequently deploy new security tools and services to address changing needs and an increase in threats. In fact, according to recent findings, mature security organizations have deployed on average: Small business: 15 and 20 security tools Medium-sized companies: 50 to 60 security tools Enterprises: over 130 tools security tools If you like math, check out these stats: A typical six-layer enterprise tech stack, composed of networking, storage, physical servers, virtualization, management, and application layers, causes enterprise organizations to struggle with 1.6 billion versions of tech installations for 336 products by 57 vendors. Increasing Investments Our research showed that 74% of organizations had increased their cybersecurity budgets to help defend against increasing cyber-attacks. Despite these increasing investments in cybersecurity, only 46% are very confident that their cyber-protection technologies can detect today’s sophisticated attacks. While investment is on the uptake, effectiveness is not. Response efforts have been hindered by the complexity caused by fragmented toolsets, highlighting that investing in too many tools can reduce the effectiveness of security defenses. More Tools, More Problems The wide variety of tools enterprises invest their time and money into to combat security threats can create numerous issues. Security analysts are understandably frustrated. They’re spending most of their time chasing false positives and performing manual processes born from these disparate toolsets. They’re working longer hours and are under more pressure to protect the business. CSO Online provides a good article listing the top challenges of security tool integration: 7 top challenges of security tool integration | CSO Online Too many security tools Lack of interoperability among security tools Broken functionality Limited network visibility Increase in false alarms Failure to set expectations properly Lack of skills You can find the full article here. Source: csoonline.com For this blog, I’ll focus on what I think is the biggest challenge the article did not mention: Disparate tools create siloed organizations.  Creating Gaps and Silos In the last
Envoyé Oui
Condensat “top 130 2022 2022: 336 62573c84d0742a0929d79352 about accelerate accompany according achieve acronym acronyms across action actors add address advanced against agree alarms all almost also always among analysis analyst analysts analytics anomali’s answer any application applications applying approach approach: are aren’t arguing article aspects attackers attacks attribute automation available average: avoiding barriers becomes been begs below benefits best between big biggest billion blog blogs born breaches break breaking breed bringing broken budgets burden business business: but can care cases caused causes centered centers centralizes challenge challenges changing chasing check cisos cloud clouds cohesive collaborate collaboration collaborative collect com combat combining comes communicating companies: complete complexity composed comprehensive concept concise confident connect connecting consequences continue correlates create creating cso csoonline current cyber cyberattacks cybersecurity cyberthreats data day deal decision defend defenses defined definitions deluge department deploy deployed despite detect detection did different differently difficult direct disparate diving don’t down download each easily easy ebook effectively effectiveness efficiently efforts ema’s endpoints ensure enterprise enterprises enterprises: esg essential evaluating even every everyone evident existing expectations experts exploit extended face fact failure false faster fields final find findings fits five focus focused focusing fostering found fragmented frequently from frustrated full functionality fusion gain gaps gartner get getting goal good greater greetings had half hand has have help helps here highlighting hindered honest hours how hype i’ll i’m i’ve identified identify inability incentive incidents include including incompatible increase increased increasing increasingly individual industry information infrastructure initiframe insights installations integrate integrated integrating integration integration: integrations intelligence interoperability invest investing investment investments issues it’s its jobs join journey just keep know lack landscape last layer layers lead learn lend less: like likely limited links list listing little live log4j longer look looking losing made magnified main maintain makers management managing manual many marketer marketers marketing math mature means meantime medium mention: might minimum money more most multiple must need needed needs negative network networking networks new next normalizes not number numerous offended offers often one ones online only operational operations organization organization’s organizational organizations organizations’ other others out over overall overworked parts party people performing physical picture positives posture potential powerful pressure pretty prevent problem problems processes products professionals programmatically programs promise properly protect protection provide provides question: quickly rather reach reading recent reduce relevant rely report research resilience: lack respond response responsible result risk risks said say says scroll seconds security see seek seen series servers services set share should showed sift sight significant siloed silos six sized skills small solely solution solutions solve solves some sometimes sophisticated source: sources spending stack state stats: stop storage structure struggle sum supported sure surveyed systems teams tech technologies technology telemetry term than thanks them themselves these they’re think third those threat threats through time today's today’s together too tool tools toolsets top try trying turn typical typically ultimately unattended under understandably unfortunately unified uptake use utilizing variety vendors versions very view virtualization visibility want we’re week week’s welcome well what when whole why wide will without work working xdr xdr 
Tags Tool Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: