Time Is Right for Unified Security Solutions, Finds Check Point's Dimensional Research Survey

  • Non-integrated point solutions make enterprise cyber security more challenging, thereby damaging confidence in security, according to a plurality of IT and security professionals.

  • Adding multiple products from different suppliers simply adds more complexity and can potentially undermine the organisation’s security.

  • Cisco’s network security unit is also banging the drum for unified security solutions with its SecureX platform, a cloud-native security platform.


Non-integrated point solutions make enterprise cyber security more challenging, thereby damaging confidence in security, making it harder to gain an accurate picture of what is going on, and wasting time managing multiple suppliers, according to a plurality of IT and security professionals. This is the key finding of a Dimensional Research survey of 411 security specialists conducted on behalf of security firm Check Point, which set out to examine IT leaders’ attitudes towards consolidated security services.


The study found that close to 50% of organisations tended to deploy anywhere between six and 40 security products around their estate, and virtually every organisation quizzed used multiple suppliers, with larger organisations tending to use more. A total of 98% of organisations said they were using multiple consoles to manage these products, making it impossible to get a truly holistic view of the threat landscape and complicating responses to any incidents that flare up.



Read more: CISA RELEASES FIRST OF ITS SERIES OF SIX CYBERSECURITY ESSENTIALS TOOLKITS

Some organisations operate under the false assumption that more products translate to more security. However, in this situation, global security leaders should adopt the less is more mentality .

~ said Ian Porteous, Check Point regional director


Meanwhile, the never-ending process of maintenance, upgrade, contract renewals and other activities related to “the care and feeding” of a security solution caused a headache for 79% of security professionals. Adding multiple products from different suppliers simply adds more complexity and can potentially undermine the organisation’s security. Enterprises need a consolidated cyber security solution that strengthens their defences while improving their agility against all forms of attack.


Check Point said that many of those who responded to the study believed prioritising supplier consolidation would lead to a better overall security posture, and many were taking advantage of the shifts occasioned by the Covid-19 coronavirus pandemic to reassess their needs. The findings support Check Point’s own views that reducing the number of suppliers enables organisations to enable a higher level of security through superior integration and fewer functional gaps between the protections that each product delivers.


That is what we need to do in the next decade – to try, as much as possible, to make security simple, available and uniform, so it can fight these threats.


At Check Point’s CPX360 event in February 2020, the firm unveiled its Infinity Next concept, which it said will address the concerns of chief information security officers (CISOs), who say that they have too much technology and too many products; of security engineers, who say that they are overwhelmed and cannot secure clouds and internet of things (IoT) estates; and DevOps teams, who say security should be automated and that they cannot wait for human approval.

Check Point does not, however, have the field all to itself. Cisco’s network security unit is also banging the drum for unified security solutions with its SecureX platform, a cloud-native security platform set to unify visibility across the supplier’s security portfolio and user infrastructure, enabling automated security workflows, and incorporating managed threat-hunting capabilities. “We’re trying to solve the number one problem that every CISO has – that these environments have been built to be highly fragmented,” said Cisco chief security officer John Maynard. “The vast majority of customers have a multi-supplier security estate, and struggle with orchestrating alerts and driving remediation at scale across that fragmented landscape.”


Read more: CISCO TO SECURE ITS BLOCKCHAIN-AS-A-SERVICE (BAAS) PLATFORM FOR ENTERPRISE SECURITY

Spotlight

Other News
Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More