Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

New research by Keeper Security, (Keeper) a leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software, reveals nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. Yet, this has resulted in security pros grappling with 32 different security solutions in their tech stacks, on average, and some managing hundreds of different security tools.

Moreover, one in 10 cybersecurity professionals admit the sheer number of individual tools in their stack makes them feel ‘not in control’ - indicating a clear need for platform consolidation.
 
Independent researchers on behalf of Keeper surveyed 218 cybersecurity professionals, including CISOs/CIOs, Senior Cybersecurity Managers and IT decision-makers, at Infosecurity Europe, held in London this month.
 
The key factors for security professionals that influence the purchase of cybersecurity solutions include:

  • Cost
  • Ease of implementation
  • Vendor reputation
  • Effectiveness against specific threats
  • Integration capabilities

Despite the financial benefits of platform consolidation, over two-thirds of professionals emphasised cost as a primary concern and placed integration capabilities as the fifth influencing factor when buying security solutions.

While nearly half (48%) prefer standalone security solutions, only 23% prioritise integration capabilities. This may pose a challenge, as it indicates security professionals are focusing on short-term fixes, rather than long-term security enhancements and budgetary impacts.
 
With an evolving threat landscape and widespread budget restraints amid the global economic downturn, organisations may find it unsustainable to continue prioritising solutions based on specific capabilities, over a holistic cybersecurity strategy.

Prior research conducted by Keeper found that 92% of business leaders worldwide experienced an increase in cyberattacks year-over-year, with 95% of respondents acknowledging that threats have grown more sophisticated, partly due to advances in AI. “It is clear that cybersecurity threats are only becoming more sophisticated, forcing security teams to confront novel attack vectors,” said Darren Guccione, CEO and Co-founder of Keeper Security.

“The challenge lies in the escalated costs and complexity of managing disparate solutions for each specific threat. Instead of perpetuating a reactive ‘whack-a-mole’ approach, security professionals must adopt a comprehensive strategy that integrates existing tools into a cohesive framework. This will enhance the efficacy of threat mitigation and empower enterprise leaders with greater control and visibility over their security posture.” Guccione said.
 
IT leaders must prioritise adapting their cybersecurity posture accordingly. Password managers enforce strong password hygiene and mitigate credential-based attacks, while Privileged Access Management (PAM) strengthens defences by controlling and monitoring high-level access to critical assets.

By integrating these solutions into a unified platform, organisations establish a layered security approach that significantly restricts unauthorised access and bolsters overall cybersecurity resilience, minimising the potential damage during cyber attacks that can cause crippling long-term impacts to organisations.
 
Image: Ideogram

You Might Also Read:

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Generated Misinformation - A Growing Concern For 2024 Elections
EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Daisy Corporate Services

Daisy Corporate Services

Daisy is one of the largest providers of communications and IT solutions across the UK, with a portfolio spanning unified communications, cloud, cyber security and resilience.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.