1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Cyber security tools tend to pile up. Here’s how to rationalize them

Discussion in 'Network World' started by RSS, Feb 29, 2016.

  1. RSS

    RSS New Member Member

    Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.

    It’s a cliché, but “change is the only constant.” Every company periodically reviews and makes changes to their applications, processes and solutions they use to conduct business. And nowhere is this rationalization more important than in the ever-shifting and increasingly perilous arena of cyber security.

    Companies often begin the security rationalization process after accumulating a portfolio of tools over the years (i.e. penetration testers, web-application, and code scanners) or through mergers and acquisitions or shifting business strategies.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page