Chuck Leaver – Have An Existing Security Architecture? Ziften Endpoint Products Easily Integrate

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver

 

Security practitioners are by nature a careful bunch. Being cautious is a trait most folks likely have coming into this industry given its mission, however it’s likewise certainly a characteristic that is picked up in time. Paradoxically this holds true even when it concerns adding additional security precautions into an already established security architecture. While one may presume that more security is better security, experience teaches us that’s not always the case. There are actually numerous issues connected with releasing a brand-new security service. One that almost always shows up near the top of the list is how well a new product integrates with other incumbent services.

Integrating concerns are available in several tastes. First and foremost, a new security control shouldn’t break anything. However additionally, brand-new security products have to willingly share hazard intelligence and act upon threat intelligence gathered throughout an organization’s whole security infrastructure. In other words, the brand-new security tools ought to interact with the existing environment of tools in place such that “1 + 1 = 3”. The last thing that many IT and security operations teams require is more siloed services/ tools.

At Ziften, this is why we have actually constantly focused on developing and delivering a completely open visibility architecture. We believe that any brand-new systems and security operations tools need to be produced with improved visibility and information sharing as essential design requirements. However this isn’t a one-way street. Developing basic integrations requires technology partnerships between market suppliers. We consider it our responsibility to work with other technology companies to equally integrate our services, thus making it easy on clients. Regrettably, lots of suppliers still think that integration of security products, particularly new endpoint security services is incredibly difficult. I hear the concern continuously in customer discussions. However info is now appearing showing this isn’t necessarily the case.

Recent survey work by NSS Labs on “advanced endpoint” products, they report that Global 2000 clients based in North America have been pleasantly shocked with how well these types of products integrate into their already established security architectures. According to the NSS research study entitled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS consequently provided in the BrightTalk webinar listed below, respondents that had actually currently released advanced endpoint products were far more favorable concerning their capability to integrate into existing security architectures than were respondents that were still in the planning stages of purchasing these products.

Particularly, for respondents that have actually already deployed advanced endpoint services: they rate integration with already established security architectures as follows:

● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Horrible) 0.0 %

Compare that to the more conservative statements from people still in the preparation stage:

● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Horrible) 3.6 %

These responses are encouraging. Yes, as kept in mind, security folks tend to be pessimists, but in spite of low expectations respondents are reporting positive results with respect to integration experiences. In fact, Ziften clients typically exhibit the very same initial low expectations when we initially discuss integrating Ziften products into their already established environment of products. But in the end, consumers are wowed by how simple it is to share details with Ziften services and their existing infrastructure.

These survey results will ideally assist alleviate issues as newer service adopters may check out and count on peer recommendations before making purchase choices. Early traditional adopters are plainly having success deploying these products and that will hopefully assist to minimize the natural cautiousness of the true mainstream.

Definitely, there is substantial distinction with services in the space, and companies must continue to perform proper due diligence in comprehending how and where services integrate into their broader security architectures. However, fortunately is that there are services not just satisfying the needs of clients, however actually out performing their initial expectations.