Technology standards: You either love them because they make IT life easier (“These are interchangeable!”) or you hate them (“Why am I stuck in this proprietary loop?”). But you could find yourself in big trouble if you make assumptions about the products you’re evaluating — especially when it comes to cybersecurity solutions. I’ve been in IT sales a long time, and I’ve seen others with much more experience than myself make this very mistake — and it’s cost them dearly.

All SIEMs Are Not the Same

Take, for example, security information and event management (SIEM) solutions. There is no governing board or standard for SIEMs. Sure, there are third-party analysts like Forrester, Gartner and Mintel, and IT publications like SC Magazine, that review and rate offerings, but these aren’t the same as a real governing board.

And yet, I’ve had clients say, “Well, if they call it a SIEM, it has to be the same.” Unfortunately, this simply isn’t true. A SIEM could be what other companies call “log management.” Without standards, a SIEM is essentially whatever the manufacturer says it is — and it has whichever features that particular manufacturer has decided to include.

[Join the webinar

Network behavior anomaly detection (NBAD) offerings are also not based on standards. When you purchase a router or a switch, a manufacturer may have proprietary features to differentiate the product, or to target a certain customer set or market vertical. But if these offerings do not meet the standards set by the Institute of Electrical and Electronics Engineers (IEEE), they have to be called a “bridge.” The IEEE has more than 1,000 global standards in its portfolio across a broad range of industries, so it’s easy to understand why a lot of very bright people assume a standard exists for everything.

Avoid Assumptions About Cybersecurity Solutions

As an old mentor of mine frequently told me, “Just because you say something with conviction does not make it true.”

So how so you get around this tendency to make assumptions about cybersecurity solutions?

  1. Understand the problem you are trying to solve. Don’t start with a product in mind — start with an assessment of your situation.
  2. Do your homework. Compare similar products you’re considering to see what they actually do, and understand what makes them unique.
  3. Ask questions. Ask your peers. Ask your salesperson.

In short, use your head when researching and examining cybersecurity solutions. Don’t assume any product you’re evaluating as a replacement is just like your current one, or fills a gap based solely on its category. Cybersecurity is a vibrant, ever-changing space, and new solutions are coming to market quickly. So unless you have a blank check to buy every offering under the sun, don’t make assumptions.

Join the webinar

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today