Why getting security tool sprawl under control is essential


As the need for security controls and the associated rise in cybersecurity spending has risen, we have failed to deliver any real progress as an industry, which is particularly evidenced by the continued exponential growth in cyber risks.
The typical information security team today struggles with a simple but frustrating and potentially dangerous problem — an overload of security software that require deployment, operation, and maintenance. These tools generate a flood of alerts that often require manual intervention, all of which often get dismissed by an overburdened security team.
About the author
Stan Wisseman, Head of North American Cybersecurity Evangelist Team, Security, Risk and Governance (SRG) Micro Focus.
To satisfy business needs, reduce cyber risks, and maintain compliance requirements, enterprises are assessing their current security tool portfolios to determine the degree of redundancy or limited capabilities of each tool and alternative approaches. However, to be successful, businesses must first understand what it is they’re looking for.
Types of Security Controls
First and foremost, there are three primary types of security controls that security tools are used to support:
- Protection occurs when an action or control either prevents weaknesses upfront, whether in the design and development, or stops a malware infection or cyberattack before it impacts users or the environment.
- Detection means identifying a bad actor (internal or external) in the environment.
- Response is a reaction to the discovery of an issue that has initiated a malicious action and attempting to contain it before it impacts the user and/or the organization.
From a cyber-risk perspective, prevention focuses on minimizing vulnerabilities and the potential for harm, while detection and response center on minimizing the impact. Additionally, there are three primary approaches to implementing a control:
- Automated control occurs entirely through machines
- Semi-automated control involves some level of human intervention
- Manual control is managed entirely by a human
As organizations mature their capabilities, many will transition from manual controls to semi-automated and automated controls, when appropriate.
Given consistent and mounting news of data breaches, what companies tend to do is deploy an increased number of tools to prevent and detect cyberattacks in an effort to fortify their security capabilities. Cybersecurity tool sprawl comes from the aftermath of repeated attempts to close evolving security gaps, which results in using too many one-off specialized solutions. However, deploying more security tools isn’t the best way to stop breaches — in fact, it can have the opposite effect.
Organizations on average run 25 to 49 security tools from up to 10 different vendors, according to the Enterprise Strategy Group (ESG), and 40 percent of organizations are so taxed that they cannot act upon at least a quarter of their security alerts, according to 451 Research. Unsurprisingly, “tool sprawl” is particularly prevalent at larger companies, especially those who have undergone mergers or acquisitions. It’s reported that these firms have approximately 30 percent more tools than their smaller counterparts.
Organizations that fail to keep cybersecurity tool sprawl under control inevitably end up creating chaos and inefficiencies. A tool smorgasbord leaves enterprises to cobble together a piecemeal security strategy in order to support their distributed environment and business needs, resulting in decreased productivity, inefficient workflows, and higher overall costs. There is also the potential that vulnerabilities could also increase through mismanagement, as resources supporting the tools are overwhelmed and are unable to keep up with upgrades or patch management.
How can we regain control of our security controls?
There are simple measures that can be put in place to curb security tool sprawl, gain operational and cost efficiencies, and to obtain value and expected ROI of tool inventory. Here are several best practices businesses can use:
1. Understand the value of what the business already has: First, businesses need to ensure all its tools are doing what they’re supposed to by ensuring they are deployed and properly configured and upgraded as necessary. Then assess whether the tools are delivering the ROI expected.
2. Leverage existing tools to the fullest extent possible: Assess the capabilities and scope of coverage for the security tools the business already owns and identify opportunities to expand use cases. (Why buy something new if an existing tool can provide the same function?) Typically, a tool is deployed for a set of use cases and never taken beyond that scope. It’s important to review the full feature set and the vendor’s product roadmap to understand what’s coming so that the business can incorporate upcoming capabilities into its program plans.
3. Integrate and consolidate: The days of a single vendor offering a proprietary stack are gone. In this heterogeneous tool environment, integration and consolidation helps maximize the value of the tools used to support programs. While a tool may be best-in-class, if it can’t integrate with other tools the business has deployed, it will result in operational hardship for the team. With the resource challenge most cybersecurity programs face, reducing manual processes is essential. The easier it is for tools to share data and information, the easier it will be to create automated or semi-automated workflows. Tools that can work together will leave fewer gaps, making them better able to protect, detect, and respond to cybersecurity threats.
4. Use a platform approach: Organizations should consider taking a platform-approach or shared service model that offers security services. This approach can offer improved efficiencies, lower costs, and result in greater overall effectiveness. It also enables businesses to have a layer of abstraction that make changes to the technology supporting the services easier.
Yet, organizations still struggle to find the right balance of security tools to prevent, detect, and respond to cyber threats. As the trend to adopt security tools delivered via cloud services and SaaS-based procurement models accelerates, it will become even more important to rationalize security tool inventories to root out the inefficiencies. By regularly evaluating and taking stock of the resources and tools already available to a business, security teams can better meet security needs – both now and in the future – without compromising efficiency and cost.
As the need for security controls and the associated rise in cybersecurity spending has risen, we have failed to deliver any real progress as an industry, which is particularly evidenced by the continued exponential growth in cyber risks. The typical information security team today struggles with a simple but frustrating…
Recent Posts
- The GSA is shutting down its EV chargers, calling them ‘not mission critical’
- Lenovo is going all out with yet another funky laptop design: this time, it’s a business notebook with a foldable OLED screen
- Elon Musk’s first month of destroying America will cost us decades
- Fortnite’s new season leans heavily on heist mechanics
- I installed iOS 18.4 dev beta and the big Siri intelligence update is nowhere to be found
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010