Security pros offer advice from the trenches of a noisy, hype-filled market Having trouble finding the right security products for your business? You’re not the only one.Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity. So we asked actual buyers of enterprise security products for tips, and here’s what they said. Damian Finol, security technical program manager at a major internet firmBusinesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised. “Do that due diligence, or you’ll regret it,” he said.Good vendors are transparent with their products. They’re also focused on hiring more security staff, and paying them well, instead of recruiting more marketers. The best ones will also be happy to train customers to run their products. “Great security companies are concentrated not just on selling, but they’re interested in supporting your enterprise, and providing consulting [and] best security practices,” he said. Quentyn Taylor, director of information security at Canon EMEACustomers should flesh out what problem they’re trying to fix instead of simply wandering into the cybersecurity market without a goal, he said.“The market is very busy. Anyone with a flashy idea, a flashy logo, can launch a product,” he said.Some security products can also be vaporware. The vendors selling them are more focused on finding a larger company to acquire them than on security, Taylor said. To avoid buyer’s remorse, customers should approach their product search with a firm plan. “Identify what your success criteria is and tell that to the vendor,” Taylor said. “And then bake that into the service contract.”“Don’t be afraid to admit when something isn’t working,” he added. “Take it on the chin, and do something different.” Gal Shpantzer, a security advisor who works as a CISO for several firmsSometimes the best way to solve a security problem is with something free you already have.“They should ask themselves if this is something we can solve in-house with the current functionality we have,” he said.For example, system administrators can block hacks based on certain malware infection methods by disabling macros in Microsoft Office. This can be set up with Microsoft’s group policy setting, at no extra cost. Shpantzer also likes to work with companies to implement proven protective measures such as application whitelisting, keeping software up to date, and other strategies like those recommended by Australia’s intelligence agency.Clients who do buy security products should be aware that not all are easy to use. Imagine a threat monitoring platform that generates a hundred alerts each day — some false positives, some real. Do you investigate every one? “If I gave you a million-dollar budget for an IDS (intrusion detection system), you would say, ‘Great, our problem is solved.’ No, your problem just began,” he said. The work is about to pile up.Beyond the initial purchase, there’s a whole lifecycle to a security product. This can include the people who will operate it, how the product will be deployed, fine-tuning the technology, and understanding all the requirements needed to run and maintain it, Shpantzer said. Jonathan Chow, a CISO at an entertainment-focused companyBad vendors tend to use scare tactics, while good vendors listen to your needs and try to help secure your business, even if that means offering free advice, he said. “There’s nothing really magical about a security product,” Chow said. “People need to be cautious and vigilant whenever spending money on a piece of technology.” His top tip for finding the right security products is to listen to what other buyers are saying.“I think asking their peers to share their experiences is the best way,” he said.Brian Honan, CEO of BH Consulting, which advises clients on IT security purchasesBe wary of vendors that can’t offer any customer references, or that only offer products demos under strict test conditions, Honan said. “If they don’t have the product reviewed or accessed by independent bodies, that would concern me as well,” he said. Unfortunately, when businesses do buy security products, they often don’t use them correctly, Honan said.“They buy a box with a flashing light, hoping it will keep them secure,” but end up with a false sense of security because they didn’t configure it right, he said. “I’ve seen this happen many times.”“You have to spend a lot of time fine-tuning these tools, and a lot of companies don’t spend the time to do that,” Honan said. “They will then point the finger at the product and say it didn’t work.”Got any tips to add? Head to our Facebook page to let us know. Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe