Written By Roark Pollock And Presented By Ziften CEO Charles Leaver
Security professionals are by nature a careful lot. Being cautious is a trait most folks likely have coming into this industry given its mission, but it’s likewise surely a characteristic that is acquired over time. Paradoxically this holds true even when it concerns adding extra security precautions into an already established security architecture. While one may assume that more security is much better security, experience teaches us that’s not always the case. There are really numerous issues associated with releasing a new security product. One that almost always appears near the top of the list is how well a brand-new product integrates with other incumbent products.
Integration concerns are available in a number of tastes. Firstly, a new security control shouldn’t break anything. But additionally, new security services have to gracefully share danger intelligence and act upon threat intelligence gathered across an organization’s whole security infrastructure. Simply put, the brand-new security tools should collaborate with the existing ecosystem of tools in place such that “1 + 1 = 3”. The last thing that the majority of IT and security operations teams need is more siloed products/ tools.
At Ziften, this is why we have actually always concentrated on building and providing a completely open visibility architecture. Our company believe that any brand-new systems and security operations tools need to be produced with enhanced visibility and information sharing as key product requirements. However this isn’t a one way street. Developing simple integrations needs technology collaborations with industry vendors. We consider it our duty to work with other technology companies to mutually integrate our products, hence making it easy on clients. Unfortunately, lots of vendors still think that integration of security products, especially brand-new endpoint security services is incredibly hard. I hear the concern constantly in client discussions. But data is now appearing showing this isn’t always the case.
Recent survey work by NSS Labs on “innovative endpoint” products, they report that International 2000 customers based in North America have actually been pleasantly shocked with how well these kinds of services integrate into their existing security architectures. According to the NSS research entitled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS consequently presented in the BrightTalk webinar below, respondents that had already released advanced endpoint items were a lot more favorable regarding their ability to integrate into existing security architectures than were participants that were still in the planning stages of purchasing these products.
Particularly, for respondents that have currently released advanced endpoint products: they rank integration with already established security architectures as follows:
● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Awful) 0.0 %
Compare that to the more conservative statements from folks still in the planning stage:
● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Horrible) 3.6 %
These reactions are motivating. Yes, as noted, security people tend to be pessimists, however in spite of low expectations respondents are reporting positive results with respect to integration experiences. In fact, Ziften clients typically exhibit the same initial low expectations when we first go over the integration of Ziften products into their already established ecosystem of services. But in the end, consumers are wowed by how easy it is to share info with Ziften products and their existing infrastructure.
These survey outcomes will hopefully help alleviate concerns as newer service adopters might check out and count on peer suggestions prior to making purchase decisions. Early traditional adopters are clearly having success deploying these products and that will ideally assist to lessen the natural cautiousness of the true mainstream.
Certainly, there is considerable distinction with products in the space, and companies should continue to perform proper due diligence in understanding how and where services integrate into their broader security architectures. But, the bright side is that there are services not just fulfilling the needs of clients, however actually out performing their initial expectations.