Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

New research by Keeper Security, (Keeper) a leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software, reveals nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. Yet, this has resulted in security pros grappling with 32 different security solutions in their tech stacks, on average, and some managing hundreds of different security tools.

Moreover, one in 10 cybersecurity professionals admit the sheer number of individual tools in their stack makes them feel ‘not in control’ - indicating a clear need for platform consolidation.
 
Independent researchers on behalf of Keeper surveyed 218 cybersecurity professionals, including CISOs/CIOs, Senior Cybersecurity Managers and IT decision-makers, at Infosecurity Europe, held in London this month.
 
The key factors for security professionals that influence the purchase of cybersecurity solutions include:

  • Cost
  • Ease of implementation
  • Vendor reputation
  • Effectiveness against specific threats
  • Integration capabilities

Despite the financial benefits of platform consolidation, over two-thirds of professionals emphasised cost as a primary concern and placed integration capabilities as the fifth influencing factor when buying security solutions.

While nearly half (48%) prefer standalone security solutions, only 23% prioritise integration capabilities. This may pose a challenge, as it indicates security professionals are focusing on short-term fixes, rather than long-term security enhancements and budgetary impacts.
 
With an evolving threat landscape and widespread budget restraints amid the global economic downturn, organisations may find it unsustainable to continue prioritising solutions based on specific capabilities, over a holistic cybersecurity strategy.

Prior research conducted by Keeper found that 92% of business leaders worldwide experienced an increase in cyberattacks year-over-year, with 95% of respondents acknowledging that threats have grown more sophisticated, partly due to advances in AI. “It is clear that cybersecurity threats are only becoming more sophisticated, forcing security teams to confront novel attack vectors,” said Darren Guccione, CEO and Co-founder of Keeper Security.

“The challenge lies in the escalated costs and complexity of managing disparate solutions for each specific threat. Instead of perpetuating a reactive ‘whack-a-mole’ approach, security professionals must adopt a comprehensive strategy that integrates existing tools into a cohesive framework. This will enhance the efficacy of threat mitigation and empower enterprise leaders with greater control and visibility over their security posture.” Guccione said.
 
IT leaders must prioritise adapting their cybersecurity posture accordingly. Password managers enforce strong password hygiene and mitigate credential-based attacks, while Privileged Access Management (PAM) strengthens defences by controlling and monitoring high-level access to critical assets.

By integrating these solutions into a unified platform, organisations establish a layered security approach that significantly restricts unauthorised access and bolsters overall cybersecurity resilience, minimising the potential damage during cyber attacks that can cause crippling long-term impacts to organisations.
 
Image: Ideogram

You Might Also Read:

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Generated Misinformation - A Growing Concern For 2024 Elections
EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.