Written By Roark Pollock And Presented By Ziften CEO Charles Leaver
Security professionals are by nature a mindful bunch. Being cautious is a characteristic most folks likely have entering into this market given its objective, however it’s also undoubtedly a quality that is acquired over time. Ironically this is true even when it concerns adding extra security controls into an already established security architecture. While one may presume that more security is better security, experience teaches us that’s not always the case. There are actually various issues associated with releasing a brand-new security product. One that usually shows up near the top of the list is how well a brand-new product integrates with existing services.
Integrating concerns can be found in a number of flavors. Firstly, a brand-new security control shouldn’t break anything. But additionally, brand-new security products need to gracefully share threat intelligence and act on threat intelligence collected throughout a company’s entire security infrastructure. To put it simply, the new security tools need to work together with the existing ecosystem of tools in place such that “1 + 1 = 3”. The last thing that the majority of security and IT operations teams require is more siloed products/ tools.
At Ziften, this is why we have actually always focused on building and delivering an entirely open visibility architecture. Our company believe that any brand-new systems and security operations tools need to be developed with improved visibility and information sharing as essential design requirements. However this isn’t really a one way street. Creating easy integrations requires technology partnerships between industry vendors. We consider it our obligation to deal with other technology businesses to equally integrate our products, therefore making it easy on consumers. Regrettably, lots of vendors still believe that integration of security services, especially brand-new endpoint security services is incredibly challenging. I hear the issue constantly in consumer conversations. But data is now appearing revealing this isn’t necessarily the case.
Recent study work by NSS Labs on “sophisticated endpoint” products, they report that Worldwide 2000 clients based in North America have been pleasantly shocked with how well these kinds of services integrate into their existing security architectures. According to the NSS research titled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS consequently presented in the BrightTalk webinar listed below, respondents that had actually already deployed innovative endpoint products were much more positive regarding their ability to integrate into already established security architectures than were participants that were still in the planning stages of purchasing these services.
Specifically, for respondents that have actually already released innovative endpoint services: they rank integration with already established security architectures as follows:
● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Horrible) 0.0 %
Compare that to the more conservative responses from people still in the preparation phase:
● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Horrible) 3.6 %
These reactions are encouraging. Yes, as noted, security folks tend to be pessimists, however in spite of low expectations respondents are reporting favorable outcomes with respect to integration experiences. In fact, Ziften consumers usually exhibit the exact same preliminary low expectations when we initially go over integrating Ziften services into their existing ecosystem of products. However in the end, clients are wowed by how simple it is to share info with Ziften services and their existing infrastructure.
These study outcomes will ideally assist ease concerns as more recent product adopters may read and rely on peer suggestions before making purchase choices. Early traditional adopters are clearly having success releasing these products which will ideally assist to decrease the natural cautiousness of the real mainstream.
Certainly, there is substantial differentiation between products in the space, and companies need to continue to carry out appropriate due diligence in comprehending how and where products integrate into their broader security architectures. But, fortunately is that there are solutions not just fulfilling the requirements of consumers, but in fact out performing their preliminary expectations.