Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
When it comes to Security Technology and Security Technology configurations -- let's say "I've seen some head scratching stuff". I see some shops with all the toys and in some cases multiple pieces of the same security technology, other security shops with nothing and cobbling together disparate pieces of security tech in order to just do the minimum level of security. For the shops with too much security technology, it's really a double edge sword in that they have a really expensive security paper weight sitting on the shelf collecting dust and a problem that less funded security shops would love to have.
I've seen all sorts of security technologies on the shelf, most commonly I see Security Incident and Event Management (SIEM) devices followed by Intrusion Detection and Intrusion Prevention Devices (IDS/IPS), Web Application Firewalls (WAF) and Governance Risk Compliance (GRC) tools. Some of the main reasons why perfectly capable security tools end up in the land of misfit toys are:
If you find yourself in the high-quality situation of having too much security technology of the shelf, there's a few things you can do to resurrect your security technology:
If you find yourself in the position of looking to consolidate, optimize, or automate your toolset call us. We've helped many organizations and we're good at curing the shelfware hangover.
Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.
Subscribe to our blog to get insights sent directly to your inbox.