www.myredfort.com Open in urlscan Pro
2606:4700:20::ac43:449e  Public Scan

URL: https://www.myredfort.com/cloud-security-services/is-cyber-security-complexity?partnerID=airnow
Submission: On April 11 via api from FR — Scanned from FR

Form analysis 1 forms found in the DOM

POST /rate-page

<form class="ratingForm" action="/rate-page" method="post" siq_id="autopick_3089">
  <div class="rating rating-large" dir="rtl">
    <input type="radio" name="rID" id="5" value="5">
    <label class="rating-label" for="5">☆</label>
    <input type="radio" name="rID" id="4" value="4">
    <label class="rating-label" for="4">☆</label>
    <input type="radio" name="rID" id="3" value="3">
    <label class="rating-label" for="3">☆</label>
    <input type="radio" name="rID" id="2" value="2">
    <label class="rating-label" for="2">☆</label>
    <input type="radio" name="rID" id="1" value="1">
    <label class="rating-label" for="1">☆</label>
    <input name="pID" type="hidden" id="pID" value="2094">
  </div>
  <button type="submit" class="btn btn-extra-large btn-light-blue lg-margin-15px-bottom d-table d-lg-inline-block md-margin-lr-auto  padding-five-top margin-ten-top w-100">Rate the article</button>
</form>

Text Content

toggle navigation
 * Technologies
   * Application Security
   * Cloud Computing
   * Cloud Management
   * Cyber Security
   * Data Encryption
   * Email Security
   * Risk Visibility
   * Managed Security Services
   * Cloud Security Services
 * In the News


In Association With MYREDFORT


IS CYBER SECURITY COMPLEXITY

Threatening your business?

LEARN MORE


 * Home
 * Cloud Security Services
 * Is Cyber Security Complexity

SECURITY SOLUTIONS THAT PROTECT MID-MARKET ORGANISATIONS DO NOT ALWAYS OFFER THE
HOLISTIC PROTECTION NEEDED TO DEFEAT MODERN THREATS.

When it comes to cyber security, complexity can be the enemy of safety. To
protect themselves against the myriad threats of today, mid-market companies
often rely on dozens of security tools and platforms. These products may work
well alone, yet when operating together they hinder security efforts, with one
of the main failures being the lack of intelligence-sharing capabilities between
services. Without the ability to distribute intel in real-time, defenders are
put at a competitive disadvantage against cyber criminals.

IBM’s most recent Cyber Resilient Organisation Report revealed that the average
company uses 45 cyber security products and found that “response efforts were
hindered by the use of too many security tools”. “The number of security tools
that an organisation was using had a negative impact across multiple categories
of the threat lifecycle amongst those surveyed,” IBM wrote. “Organisations using
50+ security tools ranked themselves 8% lower in their ability to detect, and 7%
lower in their ability to respond to an attack than those respondents with fewer
tools.”

A TENDENCY FOR ‘COOPETITION’, RATHER THAN COLLABORATION



Security teams are already time-pressed and overloaded with ‘fake news’ – false
alerts which fill up their working hours with wasted effort. If the point
security products cannot talk to each other and share threat intel effectively,
they are effectively fighting with one hand tied behind their backs.

ORGANISATIONS USING 50+ SECURITY TOOLS RANKED THEMSELVES 8% LOWER IN THEIR
ABILITY TO DETECT, AND 7% LOWER IN THEIR ABILITY TO RESPOND TO AN ATTACK THAN
THOSE RESPONDENTS WITH FEWER TOOLS

Vendors have started to build cyber intelligence sharing mechanisms into their
products, but a tendency towards “coopetition” rather than full cooperation
means they often compete as much as they collaborate. For businesses, this means
that attack intelligence picked up by a cloud security solution may not be
automatically shared with a separate product from another vendor that is
protecting cloud, web and email. This failure of communication is not just a
nuisance, but a security risk. If security services can’t talk to each other,
they can’t work together properly.

WHEN ONE DOOR CLOSES, ANOTHER IS PUSHED OPEN

Hackers don’t just give up when they see that one door is closed. Instead, they
regroup and seek other ways of getting past defences. Today, we’re seeing more
and more cross-channel attacks that highlight the risk of failing to use cyber
security protection that shares intelligence effectively across multiple entry
points.

Roughly 90% of breaches start with a phishing email. Falling victim, and handing
over the credentials that allow hackers to mount an attack, is more common than
you might think. Installing a modern, multi-layered email security system is the
obvious response to this threat, offering a defence against phishing, malware,
targeted attacks, and CEO fraud.

ROUGHLY 90% OF BREACHES START WITH A PHISHING EMAIL

Yet cross-channel attacks can easily bypass these protections by drawing victims
out of the protection of email security and into dangerous territory on the web
or in the cloud. Cross-channel attacks don’t end in the inbox, but instead,
tempt people away from the protection of email security systems and onto
malicious apps or websites. If the various services that make up an
organisation’s digital defences cannot communicate properly, what chance do they
have of defeating an attack that uses more than one channel?

THE POWER OF A PLATFORM

The IBM Cyber Resilient Organisation Report hints at a solution to the
intelligence-sharing problem when it says: “The use of open, interoperable
platforms as well as automation technologies can help reduce the complexity of
responding across disconnected tools.”

Security platforms incorporating many different products and services are one
way of tackling the threat intelligence deficit, offering control and confidence
across channels. Platforms use just one interface, which allows organisations to
gain holistic visibility of their defences. They should start by protecting
their biggest attack surface – web, cloud, and email.

Automation is a bare minimum requirement of platforms, which should distribute
intel without relying on manual work from a human. Today’s security platforms
should also be autonomous: they need to be smart enough to tackle new, emerging
threats, rather than just performing rote automated tasks.

Mid-market businesses have laboured for too long under the burden of point
products that cannot communicate with each other. Autonomous integrated security
platforms are finally lifting this weight and allowing the flow of information
that’s needed to protect against modern threats.

Please let us know if you'd like to receive more information about this topic
and one of our specialists will be in touch.



Request a callback
Request a callback



JOIN THE DISCUSSION



Please enable JavaScript to view the comments powered by Disqus.

RELATED ARTICLES


Cloud Security Services
Uncovering 0365’s Security Blind Spots




Wednesday, March 23, 2022 | 2 MINS
Cloud Security Services
The Impact of Remote Working




Wednesday, March 23, 2022 | 2 MINS
Cloud Security Services
Zero Trust, Maximum Security




Wednesday, March 23, 2022 | 2 MINS
Cloud Security Services
Russia Arrests 14 members of Top Ransomware Gang in the World




Tuesday, March 22, 2022 | 5 MINS
Cloud Security Services
CISOs: Top 5 Concerns in 2022




Tuesday, March 22, 2022 | 5 MINS
Cloud Security Services
Ukraine’s Digital Minister forms Social Media Army




Tuesday, March 22, 2022 | 5 MINS
Cloud Security Services
Autonomous Cyber Security

Easing alert fatigue


Thursday, March 17, 2022 | 4 MINS
Cloud Security Services
Fortify the New Perimeter

Protect your data in the cloud


Tuesday, March 15, 2022 | 3 MINS
Cloud Security Services
The Dangers of Ignoring Cyber Security Needs

Things to consider


Tuesday, March 15, 2022 | 3 MINS
Cloud Security Services
Data in the Cloud

And the heightened insider threat


Tuesday, March 15, 2022 | 4 MINS
Cloud Security Services
Hacking is a 24-hour business

9-5 attention no longer cuts it


Tuesday, March 15, 2022 | 3 MINS
Cloud Security Services
The future of the mid-market

If it's left behind the cybersecurity curve


Tuesday, March 15, 2022 | 4 MINS

Share this story



If you’d like more information about how to make your cybersecurity posture more
efficient and holistic, let us know.


Rate the Article

Click the link below to rate this article

Rate this article


Here’s a single security platform that seems to provide all you need to protect
your business from cyber attack and, refreshingly, they don’t put it all down to
AI.

Learn More

Rate this article

Let us know what you think about the article.

☆ ☆ ☆ ☆ ☆
Rate the article

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital
business and how to address them, so your company remains safe and secure.


Interested in what you see? Get in touch, and let's start a conversation Get in
touch
© 2021 MYREDFORT | Terms & Conditions | Privacy Policy
 * 


If you’d like to know more about any of the technologies mentioned in this
article please get in touch.

We're offline

Leave a message