Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Three New Year’s Resolutions Every Security Vendor Should Make

“It’s not a matter of if, but when you’ll get attacked.” It may have become a hackneyed phrase but it holds true. Every organization must become more resilient to cyberattacks. As we ring in the New Year, now is a great time for the security industry to resolve to provide organizations with what they need to deal with this reality: security solutions that provide faster time to detection and resolution.

“It’s not a matter of if, but when you’ll get attacked.” It may have become a hackneyed phrase but it holds true. Every organization must become more resilient to cyberattacks. As we ring in the New Year, now is a great time for the security industry to resolve to provide organizations with what they need to deal with this reality: security solutions that provide faster time to detection and resolution.

Security complexity stands in the way of meeting these requirements – for now.

On one side of the security industry are large, well-established players building security systems based on one or more flagship products. However, these systems may also contain other solutions that are not as effective as, or do not work with, other leading solutions. Niche vendors, meanwhile, are developing products aimed at closing specific security gaps.

Network Security Goals for 2016Many organizations are quick to invest in the latest innovation that fills a known gap. The result is a “patchwork quilt” of products that is difficult for security teams to manage. The solutions may have overlapping capabilities, may not meet industry standards, and are likely not interoperable. And niche technologies that cannot be deployed at scale are simply not practical, no matter how effective they may be.

As security vendors, it is incumbent upon us to reduce complexity. This means moving toward an integrated approach to threat defense by making the following three resolutions:

1. Share intelligence locally and globally in real time – Local intelligence, based on correlation and analysis of a company’s infrastructure, provides context to inform various security functions and layers of defense in order to speed detection and remediation. Global intelligence correlates all detected events and indicators of compromise across multiple organizations for analysis and immediate, shared protection. The industry is making strides to share information more proactively and in appropriate ways, especially through alliances. But real-time, automated sharing of content between trusted entities is required for faster collaboration and decision making. The faster the industry can distribute knowledge and intelligence throughout the network in a cohesive and acceptable way, the less likely adversaries will enjoy continued success and anonymity.

2. Work within existing infrastructure – Many security technologies require organizations to overhaul their security architecture just to adapt to the latest risks. This is not a sustainable model. Most organizations can’t afford to rip and replace existing solutions to keep pace with the changing threat landscape and increase security effectiveness. Resource-constrained organizations need technologies that can integrate smoothly with existing solutions and leverage the valuable data these solutions provide to strengthen protection.

3. Incorporate automation into controls – The automated exchange of threat information is foundational to more effective security. But automation is also required to spur necessary innovation in security defense and to achieve systemic response. Security solutions must be able to act on threat intelligence, applying controls using analysis and automation for systemic response across the stack of deployed security technologies. Not only does this accelerate time to remediation, but also helps to compensate for the global cybersecurity skills shortage which hampers the ability of many security teams to respond quickly and comprehensively.

The outcome of these resolutions will be a unified movement toward a scalable, integrated threat defense architecture that provides visibility, control, intelligence, and context across many solutions. Acting as a “detection and response” framework, it will accelerate response to both known and emerging threats. By resolving to make advances in these three areas, we can reduce security complexity while helping more organizations thwart more attacks. And that’s a goal we should all aim for in the New Year.

Advertisement. Scroll to continue reading.
Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...