Security Experts:

Connect with us

Hi, what are you looking for?


Management & Strategy

The Integration Imperative for Security Vendors

Integration is Key to Bringing Security Teams, Processes and Technology Together

Integration is Key to Bringing Security Teams, Processes and Technology Together

I’m going to go out on a limb here and say that if you’re reading this article, chances are you’re into technology. At home, this may show up in the type of sound system you have or home automation solution. In either case, you have probably done extensive research and devised a solution comprised of components from various manufacturers that you feel are best suited to meet your needs. A CD player, turntable, tuner, receiver, amplifier and speakers. Or a smart hub (like Amazon Echo or Google Home), thermostat, cameras, door locks, flood lights, smart appliances, smart TVs, and the list goes on. You likely assembled these solutions over time and will continue to add more devices, expecting them to interoperate seamlessly to deliver as promised. 

It’s quite similar to the environment in which we operate as security professionals every day. Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense, including firewalls, IPS/IDS, routers, web and email security, and endpoint detection and response solutions. We have SIEMs and other tools that house internal threat and event data – ticketing systems, log management repositories, case management systems.  

In the past couple of years, we’ve seen a movement towards Security Orchestration, Automation and Response (SOAR) platforms and tools. Specifically, orchestration and automation tools that define playbooks and processes, or threat intelligence platforms that act as a central repository to aggregate and enrich vast amounts of internal threat and event data with external, global threat intelligence for context so that you can understand and prioritize it for action. Regardless of the type of platform, integration is key to bringing security teams, processes and technology together within the construct of a single security architecture to drive efficiency and effectiveness, eliminating repetitive tasks so that analysts are free to focus on higher priority activities. 

A single security architecture requires bi-directional integration. Relevant, prioritized threat intelligence must flow through all systems, playbooks and processes so that automation is based on the right data. And systems and tools must feed data, events and what has been captured, back to the central repository for use in other systems. This central repository also serves as organizational memory for learning and improvement. 

More recently, we’re seeing the emergence of XDR solutions that ESG defines as, “An integrated suite of security products spanning hybrid IT architectures, designed to interoperate and coordinate on threat prevention, detection, and response. XDR unifies control points, security telemetry, analytics, and operations into one enterprise system.” There are even more challenges here because no organization is starting with a clean slate; there is existing infrastructure and the appetite to rip and replace is low. What’s more, different departments with different budgets and teams are using different solutions, so the decision-making process to move forward with a single vendor solution will be a labyrinth, at best. 

An XDR solution can’t just integrate within its own set of products. It must integrate with a range of existing tools and technologies for a certain period of time, which could be several years. As with SOAR tools, this integration must be bi-directional to reap the full value from the XDR solution. What’s more, time will tell if XDR solution providers will be able to maintain the level of innovation of best-in-class solution providers who focus their resources to address specific use cases, new types of threats and emerging threat vectors.

A case in point, in response to threat activity around COVID-19, many commercial threat intelligence providers, governments, open source feeds and frameworks like MITRE ATT&CK are providing valuable threat and outbreak-specific data. Consuming all this data is a real challenge, especially since many of the sources are new and no ready-made connectors exist to plug these feeds into existing security infrastructure. Organizations don’t have teams of analysts sitting idle and available to manually sift through numerous, new sources and massive volumes of indicators and operationalize them. What’s needed are custom connectors to any type of threat intelligence feed that can be written and deployed within hours so organizations can begin ingesting threat data from new sources quickly. Any all-in-one enterprise system needs that level of external integration capability as well.

Don’t get me wrong. As I have written about before, complexity is the enemy of security and a defense-in-depth approach brings complexity due to fragmentation. But bigger, broader solutions can’t solve this alone. Integration needs to play a role to maximize overall efficiency and effectiveness. Just as you’ve seen if you’ve committed to Amazon Echo or Google Home, they both have their sweet spots but need to be open and flexible because even they shouldn’t try to do it all. 

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies, including Valtix.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.