Why Consistency of Security Effectiveness and Performance is Key When Choosing Security Technologies
How do you separate marketing hype from reality? One approach is with third-party tests of IT security solutions—an efficient, neutral way to validate vendor claims of solution effectiveness and performance. But it isn’t enough to just look at a point-in-time result. What really counts is consistency year after year. Here’s why.
Buying security technology isn’t like buying a car or a bottle of wine where the product is static. As a buyer, as long as you made your purchase in a year when your car received top rankings by Motor Trend or that bottle of wine was lauded by Wine Spectator you can feel confident in your choice.
But security solutions aren’t frozen in time. In order to be effective in today’s dynamically changing threat and IT environments, they need to evolve. Each time these solutions evolve you’re, in effect, dealing with a “new” solution. IT security teams need to be able to count on that “new” solution just as they could at the time of the initial purchase. If a solution has a spotty track record with respect to security effectiveness and performance the potential ramifications to your buying decision and day-to-day security management must be carefully considered.
Consistency of security effectiveness and performance come into play in two important aspects of any security solution—maintenance and upgrades.
With respect to maintenance, vendors of technologies such as anti-virus (AV), intrusion detection and prevention systems (IDS/IPS), firewalls, log management and security information and event management (SIEM), frequently issue updates to monitor and protect against the latest threats. Vendors who don’t demonstrate security effectiveness year after year have a greater likelihood of providing inconsistent levels of protection from one update to the next. Whatever the reason—inconsistent investment in resources, a faltering commitment to quality, organizational changes, or complacency—the result is the same: missing potential new threats despite these updates. From a security management point of view, IT security teams need to remain even more vigilant to the possibility of breaches with vendors that can’t demonstrate a history of security effectiveness.
As networks expand and new applications, content and devices drive higher performance requirements, security teams considering upgrades must understand if hardware performs “as advertised.” When making buying decisions and considering future growth, it is important to know if actual throughput levels are on par with claimed performance and if hardware performance levels are linear. For example if a 10Gbps appliance when tested performs at 17 Gbps, does a 20Gbps model perform at 34Gbps? Reliable performance metrics are critical for planning.
Traditionally, organizations have had to sacrifice performance for effectiveness, but with today’s advanced technologies and engineering this is no longer true. IT security teams need to identify vendors they can trust to continue to develop new capabilities while maintaining security effectiveness and performance. It’s not enough to look at the latest third-party test results. Understanding historical performance and comparing track records is essential to selecting a vendor you can count on to provide consistent protection now and in the future.

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies, including Valtix.
More from Marc Solomon
- Security Pros: Before You Do Anything, Understand Your Threat Landscape
- Using Threat Intelligence to Get Smarter About Ransomware
- Looking for a New Security Technology? Choose a Partner, not a Vendor
- Tackling the Challenge of Actionable Intelligence Through Context
- Advancing Women in Cybersecurity – One CMO’s Journey
- Dealing With the Carcinization of Security
- XDR and the Age-old Problem of Alert Fatigue
- Removing the Barriers to Security Automation Implementation
Latest News
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
