1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

How to protect security product investments

Discussion in 'CSO' started by RSS, Jan 29, 2016.

  1. RSS

    RSS New Member Member

    Simply buying additional expensive security products and configuring them no more completely or precisely than you did the last slew of protection tools you purchased is a road map to recurring breaches. Misconfigured tools fail to shield your existing attack surface and add vulnerabilities to it. The quality of the tools, the intent of the enterprise, and the discipline of the employees are not typically the issues.

    The needs of the enterprise have stacked so many security products against a critical shortage of talent that your people can’t keep up. “A typical large enterprise may have deployed over 60 different security products to configure, tune, and patch. Many of these products generate hundreds if not thousands of alerts a day,” says Franklin Witter, principal industry consultant, Cybersecurity Solutions, SAS. If the same staff are fielding alerts and maintaining the tools, there may be no way to stay ahead of attacks.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page