Know your risk, then look to use cases to understand what a security product actually does before you invest in anything Credit: Thinkstock For new security practitioners, deciding which security products are the best investment can be overwhelming, especially with so many vendors making promises to solve all of your security problems.Most of us who are new to the job are looking to impress, and in business terms, that means spending wisely. For those who are looking to weed through the ocean of security solutions to find the most applicable product that addresses your business-specific risk while offering the best return on investment (ROI), use cases can be extremely helpful.Here are some tips from industry leaders on how to make better spending decisions by knowing your internal issues and looking to use cases to help you solve them.Do a risk assessmentI can’t even attribute this tip to any one professional because it’s just good practice, a necessary step. Without knowing your business- and environment-specific risks, you can’t possibly invest in the right products to mitigate those risks. “Know the regulations that matter to you,” said Jeannie Warner, security strategist at WhiteHat Security.Whether it’s PII, Social Security numbers, credit card numbers or intellectual property, any of the data you own requires that you protect it. Analyze the intelligenceMischel Kwon, president and CEO of MKACyber, said use cases are important in understanding different types of attacks.“We have a process that we use in consulting where we start with threat intelligence and intel analysis,” she said. “Vetting and analyzing the TI as it comes into an organization is one of the most important things to do, then you tag the intelligence with a use case scenario.”From there, you can map use case detection requirement to the specific tools you need for your environment.Think about internal requirementsWhether a product might be storing your logs offsite without your knowledge or creating issues with web filtering and SSL interception, there is potential that when a new product is introduced, it starts performing functions that are not inline with your internal requirements.Bilal Khan, global security and network manager at Argo Turboserve Corporation (ATC), said there is a wide range of issues from collecting meta data to indexing your data or not properly vetting your data that can pose privacy concerns.Make sure your IT staff is up to snuffIf your environment isn’t well manicured, it can be a challenge to get things working together properly. Kwon said you have to make sure your IT staff has the ability to support a capability. “You have the SOC capability to use a tool, but what you funded for resources doesn’t match what you funded for tools. Tools require skills, and that can be a money pitfall,” she said.Rely on use casesMost security products are designed to be really great at addressing certain problems but not others. Itzik Kolter co-founder and CTO at SafeBreach said, “Understanding the use cases for a security product is important to align what the product actually solves with the security issues an enterprise is trying to address.” Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe