Security Vendor Landscapes

Security Vendor Landscapes
Are cybersecurity companies motivated to solve for evolving threats?

Top Answer : If somebody had a magic lamp to end war and grant world peace forever, they would be sniped out before they could use it because there are so many incentives on the ironmongers to maintain global conflict. Cyber conflict is very similar in the sense that there's a lot of money to be made, there are people who are incentivized to do it.

Will cybersecurity as a service (CSaaS) evolve over 2022?

Top Answer : We all know innovation happens on the fringes in the small pockets and with people that are willing to take more risks. So I do think it will continue to evolve. The big players will do what they always do: focus on improving their margins and hitting their numbers. And while they're going to do research and development (R&D) and innovate, they'll probably be slower than a startup that's not encumbered by those metrics. Because at that point, you're there to lose money to make money and it changes the entire economics dynamic.

4 views
2 comments
0 upvotes
Related Tags
What is cybersecurity as a service (CSaaS)? Why should I care?

Top Answer : There was a poll on the Pulse platform that asked whether you’re embracing cybersecurity and I found the results interesting. 24% of people said yes, they're embracing cybersecurity as a service using a managed security service provider (MSSP). 28% said they’re embracing managed detection and response (MDR) or extended detection and response (XDR). 35% said yes, but they're shaping their internal efforts that way and about 13% said no.  I'm happy to see that people are embracing cybersecurity as a service (CSaaS), even for an internal approach because it gives you more established service-level agreements (SLAs). It also provides better metrics and reporting, which you can use to demonstrate to management how you're doing and what outcomes they're getting from it.

7 views
3 comments
0 upvotes
Related Tags
Do you believe it when cyber security solutions claim they’re using AI?

Top Answer : There are a number of cyber security vendors that claim they have AI embedded in their tools—CrowdStrike comes to mind, among others. They have some automation but it’s not nearly what we would define as AI.

81 views
19 comments
0 upvotes
Related Tags
What are the biggest security pitfalls when it comes to AI?

Top Answer : For security purposes, I think AI is necessary in order to handle the amount of security data out there so that you’re able to combat threats. The technology is already in the wrong hands, so how do we ensure that the good guy and the bad guy have the same things?

7 views
2 comments
1 upvotes
Related Tags
What are your thoughts on SaaS management platforms (SMP)?

Top Answer :

12 views
0 comments
2 upvotes
Related Tags
Business Application Development
Architecture & Strategy
Maintenance
Requirements & Design
Testing, Deployment & QA
Mobile Development
Development
Selection & Implementation
Business Analysis
Applications Vendor Landscapes
Optimization
Backup
Data Center
Public and Hybrid Cloud
Telephony
Network
Compute
Storage
Business Applications
Cloud
Crisis Management
Data & Business Intelligence
Artificial Intelligence
Business Intelligence Strategy
Data Management
Enterprise Integration
Integrations
Machine Learning
Governance
Data Lake
Big Data
Data Warehouse
Disruptive & Emerging Technologies
5G
Blockchain
Cryptocurrencies
Virtual Reality
IoT
Reality
Digital Innovation
Bots
Augmented Reality
End-User Services & Collaboration
Collaboration solutions
End User Equipment
End-User Computing Devices
Endpoint management
Productivity tools
Document Management
End-User Computing Applications
End-User Computing Strategy
Mobile
Voice & Video Management
Continuous Integration
Technical Product Management
DevOps
Continuous Deployment
Development
Quality Assurance
Customer Relationship Management
Enterprise Content Management
Customer Success
Enterprise Information Management
Finance
Enterprise Resource Planning
HR
Legal
Marketing Solutions
Retail
Human Resource Systems
Marketing
Product Recommendation
Sales
Risk Management
GDPR
SOX Compliance
Governance, Risk & Compliance
Infrastructure & Operations
Cloud Strategy
I&O Finance & Budgeting
Operations Management
Network Management
DR and Business Continuity
Server Optimization
Leadership
Attract & Select
Cost & Budget Management
Engage
Culture
Manage Business Relationships
Innovation
Organizational Design
Program & Project Management
Train & Develop
Values
Talent management
Performance Measurement
Organization Structure
Manage & Coach
Availability Management
Financial and Vendor Management
Reporting
Service Desk
Management Tools
Enterprise Service Management
People & Process
Process Management
Asset Management
Project & Portfolio Management
Portfolio Management
Project Management Office
Pulse
Security
Confidentiality, Integrity, Availability
Secure Cloud & Network Architecture
Endpoint Security
Data Privacy
Identity and Access Management
Security Operations Center
Security Strategy & Budgeting
Security Vendor Landscapes
Threat Intelligence & Incident Response
Threat & Vulnerability Management
Vendor Management
Infrastructure Vendor Landscapes
Budgeting
Roadmap
Outsourcing
Strategy & Operating Model
Business Continuity
Architecture Domains
Strategy
Tool Recommendation
Where have you faced the most resistance when it comes to implementing zero trust policies?

Top Answer : Zero trust has been around as a concept now for 5+ years. And every single time I've tried to implement it, it’s never worked. Because every time we've reduced the footprint down to zero trust, the people who tend to be the most vulnerable always complain. The CEO’s calling you on their trip to Hong Kong saying, "I don't understand, why can't I access my email? Why can't I get access to this SharePoint site?" You’re like, "I had zero trust and you're in a new place so you have to re-authenticate yourself." But then they don’t have their dual factor and so on. Pretty quickly we get an edict not to put these measures in place for the executive team. But of course, the executive team is the most vulnerable. So how do you work around human psychology in that regard?

Has ransomware become more prevalent or just increasingly publicized?

Top Answer : There is a lot of debate about whether the rise of ransomware has happened because of cryptocurrency. Cryptocurrency has been here and the way I see it is, there's honey, so all the flies are coming for it. If there is money, crooks will come out. 51% of the companies hit by ransomware are hit again within 3 months because people noted that they paid and then didn't increase their protection. We need to figure out how to recognize it, how to protect against it and what we can do about it if it happens. But there are costs involved. For me as a business technology guy, I need to understand where I should put my dollars. There are 30-40 different security applications in an organization. That's too many.

Where is your biggest concern when it comes to potential ransomware intrusion?

Top Answer : D) staff and their level of understanding. None of those channels are a risk in their own right, what concerns me is people clicking on links or downloads from unknown sources. They can be delivered through ay channel.