Is It Time To Consolidate Systems?

In the world of HiFi, there has always been the debate around individual components verses a combined system. The former, site selecting the optimum individual unit for a specific role, is best, it will ensure the ultimate results in HiFi quality. It can, however, be complex to marry together, and other units, such as a graphic equaliser to balance the sound, may be required.  

In the end, you have a system which may have good sound, but do you really appreciate it and have the time to tweak it, when you play different genres of music?
 
This conundrum gave birth to the integrated HiFi unit. They were uniform systems that stacked neatly on top of each other, had pre-set buttons for sound effects (pop, rock, theatre etc.) and had reasonable sound quality for the average room.
 
The data security world is in the same position as the component HiFi was, back in the day. The current reality is, that rather than reducing complexity, too many businesses are managing multiple point products, incompatible dashboards, and struggling to integrate new systems with existing defences.

This applies to all size of business but is especially hard for a mid-size enterprise, where resources are stretched and the skills needed to truly understand the information that is being presented, simply not there.

A new solution, identified by Gartner, is Security Service Edge (SSE) which is emerging to reduce complexity and improve detection and response, all in one integrated system, much like in the HiFi world.  According to Gartner, “SSE secures access to the web, private applications, and usage of cloud services. Capabilities include access control, threat protection, data security, security monitoring and acceptable use control, enforced by network-based and API-based integration”.
 
The SSE approach relieves the pressure on IT teams by integrating security from a single cloud-based platform, vital for all businesses but especially those in the mid-sized arena.
 
As Gartner notes, “vendors are increasingly divided into ‘platform’ and ‘portfolio’ camps, with the former integrating tools to make a whole that’s greater than the sum of the parts, and the latter packaging products with little integration. “As the platforms shift to the cloud for management, analysis and even delivery, the ability to leverage the shared responsibility model for security brings enormous benefits to the business”.
 
When looking for a solution, Gartner suggests:

  • That differentiating between these approaches is key to the efficiency of the suite.
  • Look at how integrated the consoles are for the management and monitoring of the consolidated platform.
  • Assess how security elements can be reused without being redefined or can apply across multiple areas seamlessly.   

An autonomous, integrated security platform has the capacity to tackle evolving threats, right across an organisation’s attack surface, round-the-clock and, at lightning speed.  Operating a single platform means all your security functions can share relevant data in a single, transparent dashboard, improving speed and accuracy of response and reporting, while helping to mitigate against cross-channel attacks and eliminate complexity.
 
SSE Platforms Have Some Key Benefits:

Enables Investment in the right security solutions at the right time:   Unlike combined HiFi systems modern SSE platforms allow you to build part by part, allowing you to consider whether you can consolidate defences and connect email, web and cloud security with identity and context – so there are no weak spots to target.

Eradicate complexity:    Instead of managing multiple point products and ploughing time or effort into supporting legacy solutions like VPNs, MPLS and WAF deployments, embrace cloud native security that ensure updates can be applied without the need for manual intervention.

Create your own rules:   Ensure you can pre-define what can act autonomously and what cannot. Create your own rules based on thousands of attack scenarios for machine speed response to enhance protection.

Gain visibility of threats across your entire ecosystem:   Stop cross-channel attacks from occurring with shared attack intelligence. Leverage in-built threat intelligence feeds to proactively stop attacks even entering the kill-chain.

Autonomous integration:   Enable cyber defences to work together, untouched by human hand, with full API provisioning and management.
 
The SSE approach enables organisations to move away from the more expensive and time-consuming approach of running separate solutions in silos. Instead, it gives companies an integrated approach that is simpler to use, easier to manage and, reduces the need for manual intervention.
 
Crucially, a platform approach enables digital business, giving users the freedom to access the applications and data they need, regardless of device or location, whilst providing visibility of threats and the tools to remove them to the IT team, to make better use their time.
 
Colin Tankard is Managing Director of Digital Pathways

You Might Also Read:

Is Your Anti-Virus Doing Its Job?:

 

« The Do’s and Don’ts Of Security Risk Management
Leveraging Data Privacy For Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

SpecTrust

SpecTrust

SpecTrust provides an all-in-one defense solution for identity abuse & fraud, enabling your company's talent to stay focused on the core business.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.