We have reached a tipping point, a point in our community’s evolution where the security vendor mambo is no longer sustainable. Credit: Thinstock I don’t know if you have noticed this or not, but the number of security tools you manage today is significantly larger than the number of tools you managed back when the internet was young. From the late 1990s until now, a scant 20-plus years, InfoSec teams have gone from managing three tools — a firewall, an intrusion detection system, and an antivirus system — to managing from 20 to 200 tools, depending on the size of the organization. However, the size of your InfoSec team has not gotten any bigger. That has stayed constant as well as the fact that we, network defenders, have to integrate the 20 to 200 tools inside our organization ourselves. The vendors don’t do that for us. This vendor sprawl has resulted in many InfoSec teams engaging in what I like to call the continuous “security vendor mambo”—that never-ending ballet of installing a device or application on the network.Installation of new security devices and applications is no easy feat as it includes wrestling with the product to incorporate it into your security workflow, crossing your fingers with the hope it’s configured properly, and then spending more time and resources updating it with the latest intelligence and software updates. For each shiny object that you add to your security vendor mambo, you have to pay for the actual control, pay to have somebody maintain it, pay for somebody to watch the data coming off of it and finally, pay to have somebody correlate the data from all of your shiny objects so that you have an integrated threat picture with which to make decisions. It seems that, from the very beginning, each year the network defender community has added more tools to our collective environments. After 20-plus years, we have reached a tipping point, a point in our community’s evolution where the security vendor mambo is no longer sustainable. We can’t keep adding more and more tools.One of the contributing factors that got us to this point is the belief in a couple of legacy best practices established by us old timers in the early days: vendor-in-depth and best-of-breed. Vendor-in-depth is that sage advice that network defenders should never put all of their chips down on a single vendor. The idea is that, if the product from any one vendor fails, our environments would be protected by all of the other vendor products. The impact to our InfoSec teams is that they have to be experts on 20 to 200 tools. Of course, we know that they cannot possibly be experts on all of those things. And even if you could find one or two people who are, the systems they manage are so complex that they will most likely make mistakes in the continuous configuration and maintenance operations – that security vendor mambo I mentioned. Mistakes are the seams that cyber adversaries use to exploit our systems.Best-of-breed means that the network defender community is going to haul every vendor’s product that accomplishes a specific task into the lab and run them through a battery of tests to find the very best one. We generally base our decisions on technical merit and whatever the coolest new shiny object is on the market. The contest usually lasts from six months to a year. And here is the kicker: if we replace an already installed vendor product with a new and shiny tool, your InfoSec staff is going to spend the next year forklifting that old technology out and forklifting the new technology in, all to get to the exact same place you were before you began the project a year ago. This usually only equates to an ounce more protection than the old system had. That’s not advancement; that is churn. The innovation that is emerging is the recognition by many network defenders that it is time we admit to ourselves that these two old best practices are not all they are cracked up to be anymore. When you are picking new security tools for your environments, you should not be looking for vendor-in-depth or best-of-breed. Instead, you should look for tools that automatically integrate with the other tools you already have. Indeed, find a platform that does most of the work you need done in one box, and also integrates with the handful of other tools you need, so the members of your InfoSec team don’t have to do the integration themselves. You are no longer buying and installing vendor tools. You will have to establish a relationship with a handful of vendors you trust. I realize this is hard for many old timers as it goes against 20-plus years of best practices, and change is hard. But for those enlightened network defenders who can get their mind around the idea, this innovation reduces the complexity of your environments, and reduces the total cost of ownership of your security program. Related content opinion It’s time to get off the treadmill: Why you should understand adversary playbooks Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The cybersecurity ind By Rick Howard Sep 06, 2018 4 mins Advanced Persistent Threats Unified Threat Management Technology Industry opinion Having a boardroom conversation about cybersecurity and material risk Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture. By Rick Howard Mar 12, 2018 5 mins Cybercrime Data and Information Security IT Strategy opinion 4 things CISOs should stress to the board of directors about cloud security It's essential for CISOs to get involved in the cloud conversation, so that they can communicate to those at the highest level of the organization why security should not be an afterthought. By Rick Howard Jan 31, 2018 5 mins Technology Industry IT Strategy Cloud Security opinion On cybersecurity and IT teams of the future, we'll all be SREs Organizations that adopt the devsecops model will outperform their competitors that don’t. By Rick Howard Dec 27, 2017 4 mins Technology Industry IT Skills Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe