NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
February 12, 2019

3 Ways to Cure a Security Shelfware Hangover

Justin Fimlaid Justin Fimlaid

When it comes to Security Technology and Security Technology configurations -- let's say "I've seen some head scratching stuff". I see some shops with all the toys and in some cases multiple pieces of the same security technology, other security shops with nothing and cobbling together disparate pieces of security tech in order to just do the minimum level of security. For the shops with too much security technology, it's really a double edge sword in that they have a really expensive security paper weight sitting on the shelf collecting dust and a problem that less funded security shops would love to have.

I've seen all sorts of security technologies on the shelf, most commonly I see Security Incident and Event Management (SIEM) devices followed by Intrusion Detection and Intrusion Prevention Devices (IDS/IPS), Web Application Firewalls (WAF) and Governance Risk Compliance (GRC) tools. Some of the main reasons why perfectly capable security tools end up in the land of misfit toys are:

  1. Business politics or lack of business alignment preventing deployment of feature set.
  2. Lack of security staff to operationalize the tool set.
  3. Customer purchased the tool to satisfy a very specific need (e.g. compliance).
  4. Lack of expertise/time on security team to fully implement the security tool.
  5. The tool doesn't deliver the features set needed. (e.g. over-promised features during purchase or lack of ongoing development of the tool).

If you find yourself in the high-quality situation of having too much security technology of the shelf, there's a few things you can do to resurrect your security technology:

  1. Enable more features in the tool. Check out your security road map, can your security shelfware help mature your program? If you have the security staff to support the tool, try enabling some additional features.
  2. Call your vendor. Your vendor wants you to keep their tools. Give them a call, they can provide assistance from configurations or just answering general questions about features. If they are unwilling to help then my personal recommendation is to clear it off the shelf.
  3. Seek buy-in from internal business peers. If your security tech is collecting dust because of lack of business alignment or stakeholder support, try to obtain support for your business case. Once you can demonstrate the tool is there to help, you might have better success partially of completely turning on the tool.

If you find yourself in the position of looking to consolidate, optimize, or automate your toolset call us.  We've helped many organizations and we're good at curing the shelfware hangover.

Included Topics

  • Cybersecurity Technology
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

1 min read
Third-Party Security in the Financial Services Industry [Infographic] Read More
1 min read
NuHarbor Security named Top Security Company for 2016 Read More
1 min read
Breach of the Week – Shocked and Amazed Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.