Cutting Complexity to Strengthen Security: Why Consolidation Matters

By : Krishna Anindyo | Friday, June 12 2020 - 12:10 IWST

Ilustration Cyber Security (Photo by Cyber Security—Advancing through AI - IEEE Innovation at Work)
Ilustration Cyber Security (Photo by Cyber Security—Advancing through AI - IEEE Innovation at Work)

INDUSTRY.co.id - Singapore - Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has today announced new findings from a survey, conducted by Dimensional Research, examining global security leaders attitudes towards consolidation.

These findings show that non-integrated, point solutions make enterprise security more challenging. As the threat landscape evolves and cyber-attacks become increasingly more sophisticated, 99% of companies using solutions from multiple vendors cited that it caused challenges to their organisation.

The key findings from the survey of 411 IT and security professionals globally confirmed the following:

With more assets to secure, confidence in security goes down - 92% of respondents said that securing their IT assets against threats is challenging. Only 34% and 38% of security leaders believe their mobile and IoT devices are properly secured, revealing a considerable gap in organisations’ security posture.

Nearly half of organisations deploy 6 - 40 security solutions, adding to complexity - Virtually every organisation in the survey used multiple security vendors. 49% of all organisations use between 7 and 40 point security products, and 27% of larger organisations use between 11 and 40 different vendors’ products.

Multiple management consoles obscures visibility - 98% of organisations manage their security products with multiple consoles, creating visibility silos. The inability to get a holistic view of an organisation’s threat posture creates visibility challenges, which complicates incident response.

Working with multiple security vendors causes challenges for organisations - 79% of security professionals say working with multiple vendors presents significant challenges. Maintenance, version upgrades, contract renewals and other activities related to the care and feeding of a security solution all take valuable time and resources.

“Some organisations operate under the false assumption that more products translate to more security. However, in this situation, global security leaders should adopt the less is more mentality,” said Itai Greenberg, Vice President of Product Management at Check Point, sources through written statement received by Industry.co.id editors on Friday (6/12/2020).

“Adding multiple products from different vendors simply adds more complexity, and can potentially undermine the organisation’s security. Enterprises need a consolidated cybersecurity solution that strengthens their defenscs while improving their agility against all forms of attack”, Itai Greenberg added.

The COVID-19 pandemic has created a phenomenon in our entire working culture. The shifts were global, rapid and widespread. Dramatic changes in your company’s infrastructure presents a unique opportunity to assess your security investments.

In the survey, 69% of respondents agree that prioritising vendor consolidation would lead to better security. The highest level of visibility, reached through consolidation, will guarantee you the security effectiveness needed to prevent sophisticated cyber attack. Unified management and risk visibility fill out your security architecture.

Reducing the number of vendors enables a higher level of security through superior integration, and fewer functional gaps between the protections each product delivers. It also significantly reduces the time, cost and resources of incident remediation processes.

Check Point Infinity is the first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber threats. Infinity’s single management centrally correlates a wide range of events across all network environments, cloud services and mobile infrastructures, and Check Point’s pre-emptive threat prevention technology blocks the most sophisticated attacks before they can inflict damage.

The survey was conducted by Dimensional Research, with 411 respondents from organisations of 500+ employees globally. Read our blog about the survey.

News Comment

Today's Industry

Ian Hall - Asia-Pacific Client Services Manager, at Synopsys Software Integrity Group

Senin, 26 Oktober 2020 - 11:00 WIB

4 Steps for CISOs to Improve Their Organisation’s Application Security Program

Synopsys recently published its annual BSIMM report, created to help organisations plan, execute, measure, and improve their software security initiatives

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Jumat, 23 Oktober 2020 - 14:30 WIB

Farm & Food 4.0: How Technology Is Transforming an Industry

Digitization has affected different industries, and especially now, the food and farming industries as well.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Jumat, 23 Oktober 2020 - 11:35 WIB

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.

The Pacific Asia Travel Association (PATA)

Jumat, 23 Oktober 2020 - 11:20 WIB

PATA Embarks On Governance Reorganisation

The Pacific Asia Travel Association (PATA) has taken the bold move to make significant changes to the design of its organisational governance at the recent Board Meeting and Annual General Meeting…

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)

Kamis, 22 Oktober 2020 - 10:35 WIB

Secure Your Containers Like Your Apps Depend On It

Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps…