Written By Roark Pollock And Presented By Ziften CEO Charles Leaver
Security professionals are by nature a careful bunch. Being cautious is a characteristic most folks likely have entering this market given its mission, however it’s also certainly a characteristic that is acquired gradually. Ironically this holds true even when it concerns including extra security precautions into an already established security architecture. While one might assume that more security is better security, experience teaches us that’s not necessarily the case. There are in fact numerous concerns connected with deploying a new security product. One that generally appears near the top of the list is how well a brand-new product integrates with other incumbent products.
Integration concerns are available in a number of tastes. First and foremost, a new security control should not break anything. However in addition, new security services need to willingly share threat intelligence and act upon hazard intelligence collected throughout an organization’s entire security infrastructure. In other words, the new security tools must work together with the existing ecosystem of tools in place such that “1 + 1 = 3”. The last thing that most IT and security operations teams need is more siloed products/ tools.
At Ziften, this is why we have actually always concentrated on building and providing an entirely open visibility architecture. Our company believe that any new systems and security operations tools have to be created with improved visibility and information sharing as essential design requirements. However this isn’t a one-way street. Developing basic integrations requires technology collaborations with market vendors. We consider it our duty to deal with other technology companies to equally integrate our services, hence making it easy on customers. Unfortunately, many suppliers still think that integration of security services, especially brand-new endpoint security services is incredibly difficult. I hear the concern constantly in consumer conversations. However information is now appearing revealing this isn’t always the case.
Current study work by NSS Labs on “advanced endpoint” services, they report that Worldwide 2000 customers based in North America have actually been happily amazed with how well these types of products integrate into their already established security architectures. According to the NSS research study titled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS consequently presented in the BrightTalk webinar listed below, participants that had currently released advanced endpoint items were far more positive regarding their ability to integrate into existing security architectures than were participants that were still in the planning stages of purchasing these products.
Specifically, for participants that have actually already released sophisticated endpoint products: they rate integration with already established security architectures as follows:
● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Terrible) 0.0 %
Compare that to the more conservative responses from people still in the planning phase:
● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Dreadful) 3.6 %
These responses are encouraging. Yes, as noted, security people tend to be pessimists, but in spite of low expectations participants are reporting favorable results when it comes to integration experiences. In fact, Ziften consumers usually display the very same preliminary low expectations when we initially go over integrating Ziften products into their already established ecosystem of services. However in the end, clients are wowed by how easy it is to share information with Ziften products and their existing infrastructure.
These survey results will hopefully help ease issues as newer service adopters might check out and rely on peer suggestions prior to making purchase choices. Early mainstream adopters are plainly having success deploying these services and that will ideally help to reduce the natural cautiousness of the real mainstream.
Definitely, there is significant differentiation between products in the space, and organizations ought to continue to perform proper due diligence in comprehending how and where services integrate into their broader security architectures. But, fortunately is that there are services not only meeting the needs of clients, however actually out performing their initial expectations.