Picking the Right Silver Bullet
With the current state of cybersecurity, the market has become inundated with “solutions”. When every manufacturer is selling hammers, then all problems look like a nail. Security personnel is expected to evaluate solutions, while still trying to find time for operational tasks. After the media fills executives’ minds with the latest security buzzwords, they all look towards the security group to implement the latest and greatest (with limited funding, of course). After perusing the latest Gartner Magic Quadrant or Forrester report, it appears that the market is filled with silver bullets.
How do you pick the right solution for your organization? Should you even be considering new solutions?
Do Define Requirements
The first thing to consider when it’s decided a new product is necessary to fill a gap, is “why?”. Define a list of requirements and use cases that are necessary for a product to provide a return on investment. These requirements will help quickly weed out manufacturers that don’t fit the bill and speed up proof of concepts for those that do. Some high-level topics to consider when building requirements include:
- Architecture – How is the solution deployed?
- Needs – What is non-negotiable from a capability standpoint?
- Wants – What would tip the scale if multiple solutions meet all of the needs?
- Impact – What impact will this product have on end-users and business processes?
- Operations – Is the necessary headcount in place to use this product after installation?
- Budget – We’d all like a Ferrari, but can we afford it?
Do Leverage a Value-Added Reseller
If creating requirements is proving difficult, reach out to a trusted security value-added reseller (VAR). While finding time to research every security product on the market is impossible, a true VAR should be able to recognize the proper security vertical to fill a gap and be able to discuss the space and competitors. Leveraging this knowledge, a VAR will be able to help compile a list of unique and comparative differentiators, shortening a list of potential manufacturers to 2 or 3 that would be worth looking into.
Many times the answer is a recommendation to not buy a product. Sometimes new head-counts, improved internal processes, or different configurations are the answer.
Don’t Leverage Resellers
Selecting a VAR is a lot like selecting a security product. While true VARs want to make sure a customer purchase the correct product, resellers only want to make sure customers purchase a product. Work with a company that is looking to make a partnership with the organization, and act as an extension to the security team, rather than someone waiting for a call about a project. A VAR should always work to increase security capability, instead of increasing security spend.
An easy question to ask to see which you’re working with is, “have they asked if I have requirements or not?”. If the answer is no, or they haven’t asked to discuss in detail to find the right fit; you’re working with a reseller.
Should I Contact Manufacturers Directly?
If a screwdriver is necessary, but you contact someone who sells hammers, your screw just turned into a nail. Manufacturers only benefit from selling their product, so of course, it will always fix the problem. Contacting a manufacturer before defining requirements is lethal.
Too often, customers view a demo for a product without having requirements defined, and walk away with a list of needs that don’t actually solve a business problem. Allowing a manufacturer to determine requirements may end up in the purchase of a product that serves little value to the organization. Also, look to a VAR to clarify any information that seems “too good to be true”.
CTO
As the Chief Technology Officer and an emerging thought-leader in the security industry, Randy is responsible for designing and executing the company’s strategic technology initiatives, which includes defining the strategy and direction of CRITICALSTART’s Managed Detection and Response (MDR) services delivered by the Zero-Trust Analytics Platform® (ZTAP). Previously, Randy served as the Director of Security Architecture, where he set the strategy for emerging vendor technologies, created the Defendable Network reference architecture, and set product direction for the company’s internally-developed Security Orchestration Automation and Response platform.
You may also be interested in…
Stay Connected on Today’s Cyber Threat Landscape
RELATED RESOURCES
- Webinar
Hook, Line, & Secure: Leveraging MDR to Streamline Phishing Detection & Response
Join Tim Bandos, Field CISO at Critical Start, as he explores the evolving landscape of phishing att... - Webinar
[On-Demand Webinar] Leveraging MDR to Streamline Phishing Detection and Response
The evolving threat of phishing requires organizations to adopt smarter, faster, and more effective ... - News
Malicious Python Package “Fabrice” Steals AWS Credentials via 37,000+ Downloads
Nov 7, 2024 | A malicious Python package called “Fabrice” was typosquatting the popular Fabric S...
RESOURCE CATEGORIES
- Buyer's Guides(1)
- Consumer Education(40)
- Consumer Stories(2)
- Cybersecurity Consulting(7)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(2)
- Interview(51)
- MDR Services(77)
- MobileSOC(9)
- News(5)
- Press Release(96)
- Research Report(11)
- Security Assessments(4)
- Thought Leadership(19)
- Threat Hunting(3)
- Video(1)
- Vulnerability Disclosure(1)