Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

New research by Keeper Security, (Keeper) a leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software, reveals nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. Yet, this has resulted in security pros grappling with 32 different security solutions in their tech stacks, on average, and some managing hundreds of different security tools.

Moreover, one in 10 cybersecurity professionals admit the sheer number of individual tools in their stack makes them feel ‘not in control’ - indicating a clear need for platform consolidation.
 
Independent researchers on behalf of Keeper surveyed 218 cybersecurity professionals, including CISOs/CIOs, Senior Cybersecurity Managers and IT decision-makers, at Infosecurity Europe, held in London this month.
 
The key factors for security professionals that influence the purchase of cybersecurity solutions include:

  • Cost
  • Ease of implementation
  • Vendor reputation
  • Effectiveness against specific threats
  • Integration capabilities

Despite the financial benefits of platform consolidation, over two-thirds of professionals emphasised cost as a primary concern and placed integration capabilities as the fifth influencing factor when buying security solutions.

While nearly half (48%) prefer standalone security solutions, only 23% prioritise integration capabilities. This may pose a challenge, as it indicates security professionals are focusing on short-term fixes, rather than long-term security enhancements and budgetary impacts.
 
With an evolving threat landscape and widespread budget restraints amid the global economic downturn, organisations may find it unsustainable to continue prioritising solutions based on specific capabilities, over a holistic cybersecurity strategy.

Prior research conducted by Keeper found that 92% of business leaders worldwide experienced an increase in cyberattacks year-over-year, with 95% of respondents acknowledging that threats have grown more sophisticated, partly due to advances in AI. “It is clear that cybersecurity threats are only becoming more sophisticated, forcing security teams to confront novel attack vectors,” said Darren Guccione, CEO and Co-founder of Keeper Security.

“The challenge lies in the escalated costs and complexity of managing disparate solutions for each specific threat. Instead of perpetuating a reactive ‘whack-a-mole’ approach, security professionals must adopt a comprehensive strategy that integrates existing tools into a cohesive framework. This will enhance the efficacy of threat mitigation and empower enterprise leaders with greater control and visibility over their security posture.” Guccione said.
 
IT leaders must prioritise adapting their cybersecurity posture accordingly. Password managers enforce strong password hygiene and mitigate credential-based attacks, while Privileged Access Management (PAM) strengthens defences by controlling and monitoring high-level access to critical assets.

By integrating these solutions into a unified platform, organisations establish a layered security approach that significantly restricts unauthorised access and bolsters overall cybersecurity resilience, minimising the potential damage during cyber attacks that can cause crippling long-term impacts to organisations.
 
Image: Ideogram

You Might Also Read:

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Generated Misinformation - A Growing Concern For 2024 Elections
EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

Convergint

Convergint

Convergint is a service-based systems integrator working alongside a global network of partners and manufacturers to deliver a range of solutions including cybersecurity.