enterprise security

Abundant security tools – a threat to enterprise security

The rapid increase in the number of security tools by big enterprises is restricting the return on security investment and also enabling the risk of cyber threats, as quoted by ReliaQuest in its 2019 Security Technology Sprawl Report. ReliaQuest surveyed over 400 security decision-makers of companies having more than 1000 employees. The report defined overwhelmed cybersecurity solutions as a “security tool tipping point” which says that the organizations adopting a large number of enterprise security solutions are more prone to cyber risks. Security teams are overwhelmed by overspending to manage their wide range of tools than working towards defending against threats. They are wasting the resources rather than making optimal use of it to proactively defend against threats.

The key findings from the report are –

  • Nearly 70% of participants agreed that their employers have invested in more than 5 new security technologies in a year whereas, 19% agreed to have invested in more than 20 new security technologies.
  • Almost 71% of the participants agreed to have added security technologies under the list of their assets much faster than recruiting capacities to engage those tools.
  • Among the security decision-makers surveyed, 69% also believed that their security teams are more engaged in managing security tools rather than employing their efforts on effective implementation of defending against threats.
  • Due to security tool sprawl, the organizations’ security is at stake. 53% of the respondents believed that the businesses have reached a tipping point where their organization’s security landscape is adversely affected by the excessive number of security tools.

Top three security technology pain points are –

Technology costs:

New technologies are advanced and are developed after doing a lot of research and testing. All these involve huge investment and then the cost of marketing the tool as well as deployment, have to be considered. The enterprises spend a lot of money on bringing and integrating the new tool in the business. On one side, management is burdened with the existing security issues, on another side, spending on a new security tool will add to their liability instead of assets.

Time to implement:

The new technical updates or the latest tools are more complexly designed to handle the finest security risks. Implementing such tools requires a lot of time and effort from the entire team. Everyone in the security team has to be trained on the implementation and exploitation of the new technology. Every time a new technology is brought in the enterprise, the entire team should spend valuable time getting accustomed to it.

Integration with other technologies:

Every organization to a certain extent has security policies and tools in the form of a defensive strategy. When introducing new technology in the organization, it needs to be integrated with other existing tools. Not necessary that each tool should comply with another and especially a few tools require explicit integration with other existing ones.

In other words, enterprises are relying more on ready-to-use security tools while they do not provide complete protection against cyber threats. Brian Murphy, CEO of ReliaQuest says that cyber risks will continue to rise and evolve. He clarifies that it is not correct to introduce or acquire new technology whenever new challenges corps up. The ReliaQuest survey proves that having more tools improves the complexity and can worsen the security system. Instead of investing resources in acquiring new technologies, enterprises shall divert them in making the best use of existing tools. The objective of the security team should be to have tight integration across the enterprise.

The real purpose of security technologies is to help enterprises staying ahead of evolving threats. vendor negotiations, financial obligations, and operational pains are avoidable, provided that the technologies deliver greater transparency. The security leaders have to define tools to the security models and then align with the processes and people in coordination to the overarching business goals to achieve the best outcomes. C|CISO is a c-suite certification from the EC-Council that builds the competency of a Chief Information Security Officer to understand the security requirements. The program covers various technical, managerial, legal, audit, and financial aspects that enable a CISO to be a firm decision-maker without exposing the organization to further risk.

get certified from ec-council
Write for Us