Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

New research by Keeper Security, (Keeper) a leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software, reveals nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. Yet, this has resulted in security pros grappling with 32 different security solutions in their tech stacks, on average, and some managing hundreds of different security tools.

Moreover, one in 10 cybersecurity professionals admit the sheer number of individual tools in their stack makes them feel ‘not in control’ - indicating a clear need for platform consolidation.
 
Independent researchers on behalf of Keeper surveyed 218 cybersecurity professionals, including CISOs/CIOs, Senior Cybersecurity Managers and IT decision-makers, at Infosecurity Europe, held in London this month.
 
The key factors for security professionals that influence the purchase of cybersecurity solutions include:

  • Cost
  • Ease of implementation
  • Vendor reputation
  • Effectiveness against specific threats
  • Integration capabilities

Despite the financial benefits of platform consolidation, over two-thirds of professionals emphasised cost as a primary concern and placed integration capabilities as the fifth influencing factor when buying security solutions.

While nearly half (48%) prefer standalone security solutions, only 23% prioritise integration capabilities. This may pose a challenge, as it indicates security professionals are focusing on short-term fixes, rather than long-term security enhancements and budgetary impacts.
 
With an evolving threat landscape and widespread budget restraints amid the global economic downturn, organisations may find it unsustainable to continue prioritising solutions based on specific capabilities, over a holistic cybersecurity strategy.

Prior research conducted by Keeper found that 92% of business leaders worldwide experienced an increase in cyberattacks year-over-year, with 95% of respondents acknowledging that threats have grown more sophisticated, partly due to advances in AI. “It is clear that cybersecurity threats are only becoming more sophisticated, forcing security teams to confront novel attack vectors,” said Darren Guccione, CEO and Co-founder of Keeper Security.

“The challenge lies in the escalated costs and complexity of managing disparate solutions for each specific threat. Instead of perpetuating a reactive ‘whack-a-mole’ approach, security professionals must adopt a comprehensive strategy that integrates existing tools into a cohesive framework. This will enhance the efficacy of threat mitigation and empower enterprise leaders with greater control and visibility over their security posture.” Guccione said.
 
IT leaders must prioritise adapting their cybersecurity posture accordingly. Password managers enforce strong password hygiene and mitigate credential-based attacks, while Privileged Access Management (PAM) strengthens defences by controlling and monitoring high-level access to critical assets.

By integrating these solutions into a unified platform, organisations establish a layered security approach that significantly restricts unauthorised access and bolsters overall cybersecurity resilience, minimising the potential damage during cyber attacks that can cause crippling long-term impacts to organisations.
 
Image: Ideogram

You Might Also Read:

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Generated Misinformation - A Growing Concern For 2024 Elections
EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.