Site icon Tech Newsday

Most Infosec Pros Believe Vendors Over Hype Their Cybersecurity Products: Survey

A lot of infosec professionals believe cybersecurity vendors torque the capabilities of their products, a new survey suggests.

75 % of respondents surveyed either agreed or strongly agreed when asked if they feel security technology vendors engage in too much hype and not enough substance, according to the survey done by the Enterprise Strategy Group and the Information Systems Security Association (ISSA).

Released Wednesday, the survey questioned 280 cybersecurity professionals around the world about their buying habits. 79 % came from the U.S. and Canada.

Among the findings:

Security technology complexity, limited efficacy of existing products and the global cybersecurity skills shortage are pushing IT leaders to consolidate security vendors, integrate technologies and openly consider security platforms instead of best-of-breed point tools, the report concludes.

It recommends infosec leaders

• push vendors toward industry standards. While there are a few established security standards “most vendors pay little more than lip service to many of these efforts,” says the report. “This lukewarm behavior would change quickly, however, if large companies pushed their security vendors toward more cooperation and industry standards adoption. Standard data formats, APIs, transport protocols, and messaging, it says, would go a long way toward easing the integration burden, which security professionals desire.

• hire or establish a cybersecurity architect role. Defining needs, assessing the current technology stack, and adopting an end-to-end security architecture will require extensive skills and experience across a range of security tools;

• establish best practices for vendor qualification. As organizations buy more security technology from fewer vendors, the report says, they should develop a more comprehensive process for all security technology procurement. This should include a list of vendor security process requirements (i.e., a secure development lifecycle, third-party risk management, security training for developers, cyber-supply chain security best practices, etc.) along with processes for continuous vendor security auditing;

• develop a three-year strategy for security technology integration. A security technology architecture may take years to establish as security teams replace point tools, consolidate vendors and integrate technologies, says the report. This process should start with a solid three-year plan that details the current security stack/architecture, defines gaps, and specifies project phases for addressing weaknesses. It’s also important to create metrics to measure benefits as independent tools begin to interoperate (i.e., MTTD, MTTC, MTTR, etc.).

Finally, the report says CISOs should communicate the three-year plan in business terms to executives and corporate boards to help them measure security efficacy/efficiency improvements and project ROI.

The post Most infosec pros believe vendors over hype their cybersecurity products: Survey first appeared on IT World Canada.

Exit mobile version