{"id":612464,"date":"2023-02-27T08:49:23","date_gmt":"2023-02-27T14:49:23","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/02\/27\/the-importance-of-synchronizing-siloed-security-solutions\/"},"modified":"2023-02-27T08:49:23","modified_gmt":"2023-02-27T14:49:23","slug":"the-importance-of-synchronizing-siloed-security-solutions","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/02\/27\/the-importance-of-synchronizing-siloed-security-solutions\/","title":{"rendered":"The importance of synchronizing siloed security solutions"},"content":{"rendered":"<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>The growing number of siloed security solutions that make up much of a modern organization\u2019s security stack are creating major headaches for enterprise cybersecurity teams. Existing solutions don\u2019t have the ability to glean contextual insights and analysts don\u2019t have the time or resources to piece together wide ranges of data points amassed from different channels.<\/p>\n<p>This results in an inability to predict and fully understand the scope of flagged threats. And that leaves organizations vulnerable.<\/p>\n<p>To hedge their bets, threat actors look to target an enterprise through multiple attack vectors. This strategy has become much simpler as companies continue to adopt new SaaS apps, web apps, cloud collaboration tools and shared cloud storage drives.<\/p>\n<p>With the number of vulnerable channels only expanding, so are the number of security solutions being deployed, making interconnection of an organization\u2019s cybersecurity solutions essential for the continued and efficient protection of the organization.<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>With the growth in sophistication and frequency of <a href=\"https:\/\/venturebeat.com\/2022\/05\/20\/report-frequency-of-cyberattacks-in-2022-has-increased-by-almost-3m\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyberattacks<\/a>, security professionals rely on a constantly growing number of cyber-defense tools. On average, organizations use <a href=\"https:\/\/www.cio.com\/article\/189489\/when-more-is-not-necessarily-better-the-impacts-of-multiple-security-tools.html\">45 different cybersecurity tools<\/a> to keep their systems safe, and many companies actually deploy\u00a0 more than that. <\/p>\n<p>With such a bloated slate of solutions, they frequently undermine one another. Security teams that operate more than 50 tools are 8% less effective at detecting an attack, and 7% less effective when responding to one. Clearly, siloed security solutions are leaving enterprises vulnerable.<\/p>\n<p>What\u2019s more, as the arsenal of unconnected solutions continues to expand, it becomes less and less sustainable for security personnel to hop from one threat defense tool to another. The siloing of all these solutions obfuscates the enterprise\u2019s holistic view of its security status and important aspects of contextual analysis. And just think about the overhead that many of these tools require for configuration and management.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20220926005190\/en\/60-of-Cybersecurity-Professionals-Feel-They-Are-Losing-Ground-Against-Cybercriminals\" target=\"_blank\" rel=\"noreferrer noopener\">Sixty percent of cybersecurity professionals admit<\/a> their current security tools do not enable their security operations team to work with maximum efficiency. Eight-four percent estimate their organization lost up to 10% of revenue from security breaches in the last 12 months.<\/p>\n<p>These percentages will continue to rise if security teams respond to increased threats with an increased number of tools, especially as they scramble to protect the newer attack vectors. With each new workplace tool (or personal tool such as WhatsApp) adopted by users, areas of vulnerability not covered by traditional enterprise security solutions increase. As reliance on new cloud-based workplace tools grows and hybrid work becomes the norm, enterprise operations will become more complex, and siloed security data will in turn become more problematic.<\/p>\n<h2 id=\"h-consolidation-consolidation-consolidation\">Consolidation, consolidation, consolidation<\/h2>\n<p>There is no silver bullet to deal with threat actors. However, it is vital that cybersecurity professionals consolidate their tools to simplify communications and manage incidents rapidly and effectively. As much as possible, security professionals should be able to view activity and data provided by cyber and IT applications from within a single platform. That way they can holistically assess the organization\u2019s security situation and easily plug gaps.<\/p>\n<p>Although the cybersecurity industry is heading towards consolidation with the rise of effective <a href=\"https:\/\/venturebeat.com\/2022\/03\/15\/xdr-driven-security-industry-consolidation-continues-with-sentinelone-to-acquire-attivo\/\" target=\"_blank\" rel=\"noreferrer noopener\">extended detection and response (XDR)<\/a> tools, the market is some ways away from reaching full maturity. In the meantime, there is still a need for bespoke solutions that deal with different threats and attack vectors. <\/p>\n<p>Therefore, a certain level of\u00a0synchronization between these different tools is vital. The industry is already seeing this in the form of multi-vendor partnerships which integrate various tools into one platform.<\/p>\n<h2>Doing away with siloed security<\/h2>\n<p>For example, enterprise platforms like Salesforce are partnering with external vendors to bolster cybersecurity capabilities, allowing users to integrate their niche app security within their wider network security. Cybersecurity EDR vendors such as SentinelOne and CrowdStrike partner with various external vendors to provide customers with coverage that is compatible with its own solution, to increase their customers\u2019 security posture and unify management.<\/p>\n<p>Security leaders should drive the vendor community to provide highly integrated solutions that deliver actionable insights from connections, as well as contextual analysis between seemingly disparate problems to prevent and remediate malicious activity. Built-in compatibility between different solutions will also reduce the manual workload required of security teams and allow them to better use their time, dealing with cyberthreats more effectively. This should be supported by <a href=\"https:\/\/venturebeat.com\/ai\/artificial-intelligence-ai-vs-machine-learning-ml-key-comparisons\/\" target=\"_blank\" rel=\"noreferrer noopener\">machine learning (ML)<\/a> and <a href=\"https:\/\/venturebeat.com\/2022\/06\/15\/what-is-artificial-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">artificial intelligence (AI)<\/a> to further reduce the manual workload.<\/p>\n<p>A hodgepodge of siloed and disconnected solutions may cause more problems than it solves. A cybersecurity team\u2019s lack of ability to see the whole picture (and more) is a major vulnerability for enterprises and impedes a team\u2019s ability to prevent and act on threats. This is especially true if threats work on multiple levels, as is increasingly the case.<\/p>\n<p>In the current economic climate, cost-cutting measures are impacting all enterprises, and a security team\u2019s time has become even more precious. So for an organization\u2019s safety, it\u2019s vital that their time is spent as efficiently as possible.<\/p>\n<p>As the industry braces itself for an increasingly complex wave of threats, breaking down silos and building up synchronicity is imperative for its success.<\/p>\n<p><em>Yoram Salinger is CEO of Perception Point.<\/em><\/p>\n<div id=\"boilerplate_2736392\">\n<h3 id=\"h-datadecisionmakers\">DataDecisionMakers<\/h3>\n<p>Welcome to the VentureBeat community!<\/p>\n<p>DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.<\/p>\n<p>If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.<\/p>\n<p>You might even consider\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/venturebeat.com\/contribute-to-datadecisionmakers\/\">contributing an article<\/a>\u00a0of your own!<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/venturebeat.com\/category\/DataDecisionMakers\/\" target=\"_blank\">Read More From DataDecisionMakers<\/a><\/p>\n<\/div><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/the-importance-of-synchronizing-siloed-security-solutions\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Yoram Salinger, Perception Point<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out all the on-demand sessions from the Intelligent Security Summit here. The growing number of siloed security solutions that make up much of a modern organization\u2019s security stack are creating major headaches for enterprise cybersecurity teams. Existing solutions don\u2019t have the ability to glean contextual insights and analysts don\u2019t have the time or resources<\/p>\n","protected":false},"author":1,"featured_media":612465,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33201,119694,46],"tags":[],"class_list":{"0":"post-612464","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-importance","8":"category-synchronizing","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/612464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=612464"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/612464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/612465"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=612464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=612464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=612464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}