Disruption doesn’t have to be disruptive when it comes to enterprise security. Say what? Let me explain.

The cybersecurity landscape recently experienced some disruption when two leading software vendors announced the divestitures of their enterprise security businesses. But what does this mean for the market overall? And what does it mean for clients and their future planning and purchasing choices?

Survival of the Fittest

Traditionally, the tech world loves disruptive technologies. Find a truly new way to do something and customers will beat a path to your door. Disruptive technologies can cause established players to reinvent themselves. Vendors that react to the challenge are more likely to succeed.

But the market disruption in enterprise security today is not about disruptive technologies — it’s more elementary. The type of disruption we are seeing is often the result of failed strategies, failed execution or both. Finding and executing on a sound business model remains a challenge for IT security providers.

Even in segments with high growth rates, such as security information and event management (SIEM), we see examples of business, such as LogRhythm, falling short of expectations and requiring more funding. So how do you make the right vendor choice?

Investment and Evolution

What we are really talking about here is client success — but not just a snapshot of success like a single product evaluation, decision or deployment. We are looking at the long-term success of a solution, with a mix of dozens of other tools, in forming a layer of protection for an enterprise. This doesn’t happen by chance.

A hit product and a rapid period of initial growth can overwhelm a vendor with customer requests for enhancements, which could derail a strategic vision. Continually adapting in a rapidly evolving market like enterprise security requires a mix of foresight, resources and execution, all backed by a sound business plan.

Enterprise Security: The Foundation of Success

IBM Security has emerged as one of the very few services providers that balance execution and vision to enable executives and security professionals to manage rapidly growing businesses and fuel innovation. Sometimes that drives acquisitions and sometimes it steers continued augmentation of existing solutions. Either way, this momentum has enabled IBM to develop and promote an immune system approach to enterprise security.

In the tech industry, we’re suckers for exciting innovation, but it’s easy to overlook the foundations of success. IBM Security continues to innovate in cloud, collaboration and cognitive security, support evolving client requirements and acquire complementary technologies. That approach, in turn, enables us to stay focused on our clients’ ongoing success.

More from CISO

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

Moving at the Speed of Business — Challenging Our Assumptions About Cybersecurity

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth. In our upcoming paper, Prosper in the Cyber Economy, published by…

Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022.While the law has passed, many healthcare organizations remain uncertain about how it will directly affect them. If your organization has questions about what steps to take and what the law means for your processes,…