<img src="http://www.66infra-strat.com/79881.png" style="display:none;">

Will Platform Consolidation Dismantle Your Security Solutions?

Security SolutionThe most logical step, following proliferation, is consolidation. This is a trend that we've seen in nearly every other industry after periods of intense innovation, and it's a trend that we're seeing now in information security.

Over the last couple of years, as novel forms of malware have done increasing damage to the enterprise, a rash of new security companies have risen to the challenge. These tend to focus on new methods of combating security threats, either via machine learning or behavioral detection. As time went on, these new companies have undergone about four outcomes:

  1. They've gone out of business
  2. They've  merged with each other
  3. They've been purchased by an incumbent security vendor
  4. They've survived to become an incumbent in their own right

Most of these new companies are going to fair, merge or be acquired. In other words, if you've bought a new security solution recently, you may find that it suddenly exists under a new label. In other words, it might become part of a corporate ecosystem that doesn't coexist with the other products defending or supporting your data center. Are you about to find yourself suddenly undefended?

Defense-in-Depth: Part 2

The past two years have seen Avast acquired by AVG, Blue Coat acquired by Symantec, Websense merged with Stonesoft, and more. The new ideas of yesterday are being incorporated into today's billion-dollar security incumbents, and the results are mixed.

One major worry from consolidation is that it may reverse the gains made against an insidious concept known as "Defense in Depth." This is the idea that each security organization should be running several security products — an antivirus suite, a firewall, IDS/IPS, a SIEM, etc. This worked out to an average of 75 security tools per company.

In theory, all of these tools work in concert to prevent attacks. In practice, SOCs become overloaded with false positives, and endpoints become sluggish due to an overload of security programs. The recent proliferation of new security software was supposed to replace defense-in-depth — paring those 75 security tools down to just two or three.

Initially, those security tools were rather ecosystem agnostic, but this new wave of acquisitions may put an end to this. Imagine waking up one morning and finding out that your next generation firewall no longer feeds data to your next-generation antivirus, because they're both owned by two different security giants.

In this case, your only choices would either be to limp along with an incomplete security solutio

n, or ditch one or more products in order to standardize on a corporate ecosystem. In effect, this rolls back the end of defense in depth, forcing you to buy more products in order to solve a problem that doesn't have much to do with security.

Sidestep Platform Consolidation Issues with Safe-T

The way to avoid being locked into an unwanted security ecosystem is to find a solution that lets you tie any security solutions in with any other. This not only lets companies use products from different providers in conjunction with one another, it also improves the efficacy of your security solution as a whole.

Here's an example — imagine a stream of data entering your organization. You don't know whether that data represents an intrusion attempt or not. In an environment with 75 different security tools, you can't be sure whether that data is getting run by every single one of them (and it's going to take awhile either way). In a data with tools from competing corporate ecosystems, administrators might have to jury-rig a system in order to get data from one tool to another.

With Safe-T, businesses don't have to worry about where their data goes. Safe-T uses a system of API connectors to automatically brings all incoming data streams past any in-line security solution you select. This effectively sidesteps the problem of interoperability, letting companies using any combination of security programs to defend their perimeter. For more information, contact Safe-T today.

Safe-T + Check Point

About the Author: Julie Shafiki

Julie Shafiki

VP Marketing at Safe-T Data

 

Subscribe to Email Updates