How to assess a cybersecurity vendor in simple, unbiased and efficient manner? Last week, I had the pleasure to lead High-Tech Bridge’s team at Black Hat Asia 2017 in Singapore and present a session entitled “Modern challenges of Web Application Security”. At the event, many great companies were presenting exciting cybersecurity products and solutions, with very attractive and quite well-thought out marketing claims.However, when there is so much motley diversity, it starts bordering with pollution effect, precluding security decision makers from making the right choice. During the event, I had several brief discussions with CISOs – friends of mine from large organizations, who were also a little bit confused by the puzzle of different products.I will try to present five simple pieces of advice that can protect you from cybersecurity pollution, and help select the right product, appropriate for your organization and its needs.Ask the vendor which risks their solution mitigates. Every security control should properly address a particular cybersecurity risk, or a group of risks, in a priority defined in your risk mitigation plan. If a vendor cannot clearly state the risks its product addresses – time to move to the next one. Ask the vendor how they are better than competitors. Today, many security companies claim that they are absolutely unique and have no competitors at all, however it’s not true. Every cybersecurity company has many competitors, trying to address the same or very similar risks, albeit in a different manner. Therefore, if you can’t get a clear answer why a vendor can mitigate your risks better than others – confidently leave their booth.Ask the vendor for a PoC at your premises. If a product or solution is trusted by FT500 companies – that’s great news, however it can be totally irrelevant for your organization, internal business processes, risk appetite and culture within your organization. Therefore, before judging efficiency and effectiveness of any product or solution, make sure you will thoroughly test it at your premises. Ask the vendor for technology alliances they have. Technology alliances will simply further integration of the product into your existing cyber defense arsenal. Moreover, products with good market potential usually offer different types of technology integration and joint-solutions with other leading cybersecurity companies. Therefore, if your vendor has a solid portfolio of technology alliances – it can be a reliable sign that the product is unbiasedly trusted by the industry, and will be properly developed and maintained in the future.Ask your peers about the product. Today, there are so many different cybersecurity reports and awards, that in the near future we will need a dedicated report on which cybersecurity reports to read. Jokes apart, your peers from similar organizations are probably the most unbiased and trusted sources of information about a particular product. To save time, have a look first at resources where veracity of reviews can be trusted, such as Gartner Peer Insights.By following these five simple techniques, you can get a great enjoyment of any security event or conference, without bearing the burden of overcoming FUD tactics and making a complicated choice about vendor claims.Add a comment to our Facebook page. Related content opinion 5 steps to boost your application security testing ROI Even in the era of AI hype, spending more does not necessarily means spending wiser. By Ilia Kolochenko Jan 17, 2018 6 mins Application Security Security opinion How artificial intelligence fits into cybersecurity Ask these questions to help distinguish between a promising machine learning technology and a marketing hype. By Ilia Kolochenko Jul 31, 2017 6 mins Machine Learning Security analysis Newly elected French president raises questions in trying to dupe hackers Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope. By Ilia Kolochenko May 11, 2017 4 mins Advanced Persistent Threats Government Technology Industry analysis RSAC 2017: The end of easy cash bounties Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities. By Ilia Kolochenko Feb 21, 2017 4 mins RSA Conference Technology Industry IT Strategy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe