Our Advanced Endpoint Services Will Integrate With Your Security Architecture – Chuck Leaver

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver

 

Security practitioners are by nature a mindful lot. Being cautious is a quality most folks likely have entering into this market given its mission, however it’s likewise certainly a characteristic that is learned over time. Ironically this holds true even when it pertains to adding extra security precautions into an already established security architecture. While one might assume that more security is better security, experience teaches us that’s not necessarily the case. There are in fact many issues related to deploying a brand-new security service. One that almost always appears near the top of the list is how well a new service integrates with existing products.

Integrating concerns come in several tastes. Firstly, a brand-new security control should not break anything. But furthermore, new security services need to willingly share hazard intelligence and act upon threat intelligence collected across a company’s entire security infrastructure. In other words, the new security tools must work together with the existing community of tools in place such that “1 + 1 = 3”. The last thing that many security and IT operations teams require is more siloed services/ tools.

At Ziften, this is why we’ve always concentrated on developing and delivering a completely open visibility architecture. We believe that any brand-new systems and security operations tools need to be produced with enhanced visibility and information sharing as crucial product requirements. However this isn’t really a one way street. Producing simple integrations needs technology partnerships with industry vendors. We consider it our responsibility to work with other innovation businesses to mutually integrate our services, hence making it easy on clients. Sadly, numerous suppliers still believe that integration of security services, particularly new endpoint security products is very difficult. I hear the concern continuously in customer conversations. But information is now appearing revealing this isn’t really always the case.

Current study work by NSS Labs on “advanced endpoint” products, they report that International 2000 clients based in North America have been happily shocked with how well these types of products integrate into their existing security architectures. In accordance with the NSS research study titled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS subsequently presented in the BrightTalk webinar below, respondents that had actually already deployed sophisticated endpoint items were much more favorable regarding their capability to integrate into already established security architectures than were respondents that were still in the planning stages of acquiring these products.

Specifically, for respondents that have currently deployed sophisticated endpoint products: they rank integration with already established security architectures as follows:

● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Horrible) 0.0 %

Compare that to the more conservative responses from folks still in the preparation phase:

● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Horrible) 3.6 %

These statements are encouraging. Yes, as noted, security people have the tendency to be pessimists, however in spite of low expectations respondents are reporting positive outcomes when it comes to integration experiences. In fact, Ziften clients usually display the exact same preliminary low expectations when we initially go over the integration of Ziften products into their existing environment of services. However in the end, consumers are wowed by how simple it is to share info with Ziften products and their already established infrastructure.

These survey outcomes will ideally assist ease issues as more recent product adopters may check out and count on peer recommendations prior to making purchase choices. Early traditional adopters are clearly having success deploying these services which will ideally assist to lessen the natural cautiousness of the real mainstream.

Certainly, there is substantial differentiation with products in the space, and organizations need to continue to perform appropriate due diligence in comprehending how and where products integrate into their broader security architectures. But, the good news is that there are products not just meeting the requirements of clients, but actually out performing their initial expectations.

Leave a Reply

Your email address will not be published. Required fields are marked *