Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

New research by Keeper Security, (Keeper) a leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software, reveals nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. Yet, this has resulted in security pros grappling with 32 different security solutions in their tech stacks, on average, and some managing hundreds of different security tools.

Moreover, one in 10 cybersecurity professionals admit the sheer number of individual tools in their stack makes them feel ‘not in control’ - indicating a clear need for platform consolidation.
 
Independent researchers on behalf of Keeper surveyed 218 cybersecurity professionals, including CISOs/CIOs, Senior Cybersecurity Managers and IT decision-makers, at Infosecurity Europe, held in London this month.
 
The key factors for security professionals that influence the purchase of cybersecurity solutions include:

  • Cost
  • Ease of implementation
  • Vendor reputation
  • Effectiveness against specific threats
  • Integration capabilities

Despite the financial benefits of platform consolidation, over two-thirds of professionals emphasised cost as a primary concern and placed integration capabilities as the fifth influencing factor when buying security solutions.

While nearly half (48%) prefer standalone security solutions, only 23% prioritise integration capabilities. This may pose a challenge, as it indicates security professionals are focusing on short-term fixes, rather than long-term security enhancements and budgetary impacts.
 
With an evolving threat landscape and widespread budget restraints amid the global economic downturn, organisations may find it unsustainable to continue prioritising solutions based on specific capabilities, over a holistic cybersecurity strategy.

Prior research conducted by Keeper found that 92% of business leaders worldwide experienced an increase in cyberattacks year-over-year, with 95% of respondents acknowledging that threats have grown more sophisticated, partly due to advances in AI. “It is clear that cybersecurity threats are only becoming more sophisticated, forcing security teams to confront novel attack vectors,” said Darren Guccione, CEO and Co-founder of Keeper Security.

“The challenge lies in the escalated costs and complexity of managing disparate solutions for each specific threat. Instead of perpetuating a reactive ‘whack-a-mole’ approach, security professionals must adopt a comprehensive strategy that integrates existing tools into a cohesive framework. This will enhance the efficacy of threat mitigation and empower enterprise leaders with greater control and visibility over their security posture.” Guccione said.
 
IT leaders must prioritise adapting their cybersecurity posture accordingly. Password managers enforce strong password hygiene and mitigate credential-based attacks, while Privileged Access Management (PAM) strengthens defences by controlling and monitoring high-level access to critical assets.

By integrating these solutions into a unified platform, organisations establish a layered security approach that significantly restricts unauthorised access and bolsters overall cybersecurity resilience, minimising the potential damage during cyber attacks that can cause crippling long-term impacts to organisations.
 
Image: Ideogram

You Might Also Read:

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Generated Misinformation - A Growing Concern For 2024 Elections
EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.