Quantcast
Channel: Blog – Swimlane
Viewing all articles
Browse latest Browse all 72

Security Consolidation vs. Security Orchestration

$
0
0

The Right Choice Will Make All the Difference

A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill them at all.  This chronic shortage of cyber security professionals is exacerbated as the number of security tools in use continues to increase.  SecurityIntelligence.com noted the average enterprise can have security products from as many as 45 different vendors.

This is leaving CISOs scrambling to formulate strategies that optimize their staff resources and security processes.

There are a couple of primary approaches that they can consider. One is to consolidate and reduce the number of cyber security products and vendors that they’re using. The other is to leverage orchestration to enhance how their preferred cyber security solutions work together.  Making the right strategic choice is critical, as the impact will be far-reaching.

While on the surface both have their merits, when you really drill down, orchestration has a clear advantage. When you consider the number of new threats being unleashed every day, the constant barrage of attacks, and the need to defend against multiple attack vectors, the adaptability and flexibility of orchestration makes it the better choice.

Security orchestration allows the CISO to implement best-of-breed, specialized security solutions that are typically better equipped to detect and respond to new threats and/or new compliance/governance demands.  The trend of implementing layered security also favors orchestration.  With the orchestration approach, it is simpler to add new “layers” or pieces of cyber security protection into the overall security infrastructure.  As new solutions are implemented, orchestration simplifies the process of integrating them into the security infrastructure.

With platform consolidation, an organization may be forced to wait, unprotected, while their vendors of choice design, develop, and release new products and capabilities.  Simply put, consolidation reduces the number of security options for the CISO.

While IT organizations have traditionally found that vendor or product consolidation can produce substantial efficiencies for operational infrastructure components, cyber security has different rules.  IT infrastructure is under organizational control and the needs can be documented.  Cyber security threats are not under our control and new/different exploits emerge regularly. Security orchestration provides efficiency with the necessary flexibility to meet a rapidly changing threat landscape.

Gartner agrees, and has listed orchestration as one of their Top 10 cyber security trends.  And Yishai Beeri noted in Dark Reading, “I predict orchestration, rather than consolidation, will be the way for enterprises to cope with security solution fragmentation.”

The post Security Consolidation vs. Security Orchestration appeared first on Swimlane.


Viewing all articles
Browse latest Browse all 72