Is It Time To Consolidate Systems?

In the world of HiFi, there has always been the debate around individual components verses a combined system. The former, site selecting the optimum individual unit for a specific role, is best, it will ensure the ultimate results in HiFi quality. It can, however, be complex to marry together, and other units, such as a graphic equaliser to balance the sound, may be required.  

In the end, you have a system which may have good sound, but do you really appreciate it and have the time to tweak it, when you play different genres of music?
 
This conundrum gave birth to the integrated HiFi unit. They were uniform systems that stacked neatly on top of each other, had pre-set buttons for sound effects (pop, rock, theatre etc.) and had reasonable sound quality for the average room.
 
The data security world is in the same position as the component HiFi was, back in the day. The current reality is, that rather than reducing complexity, too many businesses are managing multiple point products, incompatible dashboards, and struggling to integrate new systems with existing defences.

This applies to all size of business but is especially hard for a mid-size enterprise, where resources are stretched and the skills needed to truly understand the information that is being presented, simply not there.

A new solution, identified by Gartner, is Security Service Edge (SSE) which is emerging to reduce complexity and improve detection and response, all in one integrated system, much like in the HiFi world.  According to Gartner, “SSE secures access to the web, private applications, and usage of cloud services. Capabilities include access control, threat protection, data security, security monitoring and acceptable use control, enforced by network-based and API-based integration”.
 
The SSE approach relieves the pressure on IT teams by integrating security from a single cloud-based platform, vital for all businesses but especially those in the mid-sized arena.
 
As Gartner notes, “vendors are increasingly divided into ‘platform’ and ‘portfolio’ camps, with the former integrating tools to make a whole that’s greater than the sum of the parts, and the latter packaging products with little integration. “As the platforms shift to the cloud for management, analysis and even delivery, the ability to leverage the shared responsibility model for security brings enormous benefits to the business”.
 
When looking for a solution, Gartner suggests:

  • That differentiating between these approaches is key to the efficiency of the suite.
  • Look at how integrated the consoles are for the management and monitoring of the consolidated platform.
  • Assess how security elements can be reused without being redefined or can apply across multiple areas seamlessly.   

An autonomous, integrated security platform has the capacity to tackle evolving threats, right across an organisation’s attack surface, round-the-clock and, at lightning speed.  Operating a single platform means all your security functions can share relevant data in a single, transparent dashboard, improving speed and accuracy of response and reporting, while helping to mitigate against cross-channel attacks and eliminate complexity.
 
SSE Platforms Have Some Key Benefits:

Enables Investment in the right security solutions at the right time:   Unlike combined HiFi systems modern SSE platforms allow you to build part by part, allowing you to consider whether you can consolidate defences and connect email, web and cloud security with identity and context – so there are no weak spots to target.

Eradicate complexity:    Instead of managing multiple point products and ploughing time or effort into supporting legacy solutions like VPNs, MPLS and WAF deployments, embrace cloud native security that ensure updates can be applied without the need for manual intervention.

Create your own rules:   Ensure you can pre-define what can act autonomously and what cannot. Create your own rules based on thousands of attack scenarios for machine speed response to enhance protection.

Gain visibility of threats across your entire ecosystem:   Stop cross-channel attacks from occurring with shared attack intelligence. Leverage in-built threat intelligence feeds to proactively stop attacks even entering the kill-chain.

Autonomous integration:   Enable cyber defences to work together, untouched by human hand, with full API provisioning and management.
 
The SSE approach enables organisations to move away from the more expensive and time-consuming approach of running separate solutions in silos. Instead, it gives companies an integrated approach that is simpler to use, easier to manage and, reduces the need for manual intervention.
 
Crucially, a platform approach enables digital business, giving users the freedom to access the applications and data they need, regardless of device or location, whilst providing visibility of threats and the tools to remove them to the IT team, to make better use their time.
 
Colin Tankard is Managing Director of Digital Pathways

You Might Also Read:

Is Your Anti-Virus Doing Its Job?:

 

« The Do’s and Don’ts Of Security Risk Management
Leveraging Data Privacy For Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.