Last week, I had the pleasure to lead High-Tech Bridge\u2019s team at Black Hat Asia 2017 in Singapore and present a session entitled "Modern challenges of Web Application Security\u201d. At the event, many great companies were presenting exciting cybersecurity products and solutions, with very attractive and quite well-thought out marketing claims.However, when there is so much motley diversity, it starts bordering with pollution effect, precluding security decision makers from making the right choice. During the event, I had several brief discussions with CISOs - friends of mine from large organizations, who were also a little bit confused by the puzzle of different products.I will try to present five simple pieces of advice that can protect you from cybersecurity pollution, and help select the right product, appropriate for your organization and its needs.Ask the vendor which risks their solution mitigates. Every security control should properly address a particular cybersecurity risk, or a group of risks, in a priority defined in your risk mitigation plan. If a vendor cannot clearly state the risks its product addresses \u2013 time to move to the next one.Ask the vendor how they are better than competitors. Today, many security companies claim that they are absolutely unique and have no competitors at all, however it\u2019s not true. Every cybersecurity company has many competitors, trying to address the same or very similar risks, albeit in a different manner. Therefore, if you can\u2019t get a clear answer why a vendor can mitigate your risks better than others \u2013 confidently leave their booth.Ask the vendor for a PoC at your premises. If a product or solution is trusted by FT500 companies \u2013 that\u2019s great news, however it can be totally irrelevant for your organization, internal business processes, risk appetite and culture within your organization. Therefore, before judging efficiency and effectiveness of any product or solution, make sure you will thoroughly test it at your premises.Ask the vendor for technology alliances they have. Technology alliances will simply further integration of the product into your existing cyber defense arsenal. Moreover, products with good market potential usually offer different types of technology integration and joint-solutions with other leading cybersecurity companies. Therefore, if your vendor has a solid portfolio of technology alliances \u2013 it can be a reliable sign that the product is unbiasedly trusted by the industry, and will be properly developed and maintained in the future.Ask your peers about the product. Today, there are so many different cybersecurity reports and awards, that in the near future we will need a dedicated report on which cybersecurity reports to read. Jokes apart, your peers from similar organizations are probably the most unbiased and trusted sources of information about a particular product. To save time, have a look first at resources where veracity of reviews can be trusted, such as Gartner Peer Insights.By following these five simple techniques, you can get a great enjoyment of any security event or conference, without bearing the burden of overcoming FUD tactics and making a complicated choice about vendor claims.Add a comment to our Facebook page.