In a blog\u00a0post I wrote in August \u2014 The most important attributes of a cybersecurity platform \u2014\u00a0I listed the eight attributes that my colleague Doug Cahill and I believe are critical for a cybersecurity technology platform. The blog post also ranks the eight attributes according to a recent survey of 232 cybersecurity professionals working at enterprise organizations (i.e. those with more than 1,000 employees).It was recently pointed out to me that while I listed the attributes, I did not define them. My apologies for the oversight, so here again is the list of attributes (along with the percentage of survey respondents that rated them as most important) along with definitions for each one.Coverage that includes major threat vectors such as email and web security (38%).\u00a0Any security researcher will tell you that at least 90% of cyber attacks emanate from phishing emails, malicious attachments, or weaponized URLs. A cybersecurity platform must apply filters and monitoring to these common threat vectors for blocking malware and providing visibility into anomalous, suspicious, and malicious behaviors.\u00a0Central management across all products and services (33%).\u00a0In this instance, central management means configuration management and policy management, along with common administration and reporting. Cybersecurity technology platform management provides an aggregated alternative to the current situation where organizations operate endpoint security management, network security management, malware sandboxing management, etc.\u00a0Capabilities across threat prevention, detection, and response (31%).\u00a0CISOs want their security technologies to block the majority of attacks with detection efficacy in excess of 95%. When attacks circumvent security controls, they want their cybersecurity technology platforms to track anomalous behaviors across the kill chain (or the MITRE ATT&CK framework), provide aggregated alerts that string together all the suspicious breadcrumbs, and provide functions to terminate processes, quarantine systems, or rollback configurations to a known trusted state.\u00a0Coverage that spans endpoints, networks, servers, and cloud-based workloads (27%).\u00a0This one is sort of self-explanatory. Today\u2019s enterprises feature Balkanized endpoint, network, server, and cloud-workload protection tools don\u2019t talk to each other.\u00a0Enterprise organizations want tightly integrated tools that span their IT infrastructure and work together as security force multipliers.\u00a0Cloud-based backend services \u2014 i.e. analytics, threat intelligence, signature\/rules distribution, etc. (26%).\u00a0Think of the cloud as the backend brains of a cybersecurity technology platform. Cloud-based services will aggregate suspicious behaviors across customers, run these behaviors through advanced and constantly improving machine learning algorithms, track the latest threat intelligence, and provide customized analytics and threat intelligence curation for specific customers, and industries, etc. In this way, all customers benefit from universal and customized services.\u00a0Openness \u2014 i.e. open APIs, developer support, ecosystem partners, etc. (22%).\u00a0Even the best cybersecurity technology platforms won\u2019t offer exhaustive security coverage. Therefore, security platforms must be fitted with APIs for third-party technology integration and developer support. This will also encourage the network effect where cybersecurity technology platform users share development best practices and homegrown software amongst the community.\u00a0A combination of tightly coupled products\u00a0and\u00a0services \u2014 i.e. products and managed service options offering central command-and-control (20%).\u00a0 Given the global cybersecurity skills shortage, organizations will pick and choose which security technologies they run in-house and which they outsource to managed security service providers. Leading cybersecurity technology platforms will enable seamless interoperability across any product and managed services mix.\u00a0A platform that is offered in multiple deployment options \u2014 i.e. on premises, cloud delivered, hybrid, etc. (18%).\u00a0Large organizations tend to use hybrid technology deployments, running security appliances at corporate headquarters while opting for cloud-based security proxy services to support remote offices and mobile workers. Cybersecurity technology platforms will offer this hybrid support across all security controls (regardless of form factor) with a central management plane.\u00a0While some attributes are rated higher than others, large organizations will need all eight over time. Therefore, CISOs should qualify, evaluate, and test cybersecurity technology platforms across all attributes while prioritizing those needed to address near-term requirements.