Disruption doesn’t have to be disruptive when it comes to enterprise security. Say what? Let me explain.

The cybersecurity landscape recently experienced some disruption when two leading software vendors announced the divestitures of their enterprise security businesses. But what does this mean for the market overall? And what does it mean for clients and their future planning and purchasing choices?

Survival of the Fittest

Traditionally, the tech world loves disruptive technologies. Find a truly new way to do something and customers will beat a path to your door. Disruptive technologies can cause established players to reinvent themselves. Vendors that react to the challenge are more likely to succeed.

But the market disruption in enterprise security today is not about disruptive technologies — it’s more elementary. The type of disruption we are seeing is often the result of failed strategies, failed execution or both. Finding and executing on a sound business model remains a challenge for IT security providers.

Even in segments with high growth rates, such as security information and event management (SIEM), we see examples of business, such as LogRhythm, falling short of expectations and requiring more funding. So how do you make the right vendor choice?

Investment and Evolution

What we are really talking about here is client success — but not just a snapshot of success like a single product evaluation, decision or deployment. We are looking at the long-term success of a solution, with a mix of dozens of other tools, in forming a layer of protection for an enterprise. This doesn’t happen by chance.

A hit product and a rapid period of initial growth can overwhelm a vendor with customer requests for enhancements, which could derail a strategic vision. Continually adapting in a rapidly evolving market like enterprise security requires a mix of foresight, resources and execution, all backed by a sound business plan.

Enterprise Security: The Foundation of Success

IBM Security has emerged as one of the very few services providers that balance execution and vision to enable executives and security professionals to manage rapidly growing businesses and fuel innovation. Sometimes that drives acquisitions and sometimes it steers continued augmentation of existing solutions. Either way, this momentum has enabled IBM to develop and promote an immune system approach to enterprise security.

In the tech industry, we’re suckers for exciting innovation, but it’s easy to overlook the foundations of success. IBM Security continues to innovate in cloud, collaboration and cognitive security, support evolving client requirements and acquire complementary technologies. That approach, in turn, enables us to stay focused on our clients’ ongoing success.

More from CISO

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Do You Really Need a CISO?

2 min read - Cybersecurity has never been more challenging or vital. Every organization needs strong leadership on cybersecurity policy, procurement and execution — such as a CISO, or chief information security officer. A CISO is a senior executive in charge of an organization’s information, cyber and technology security. CISOs need a complete understanding of cybersecurity as well as the business, the board, the C-suite and how to speak in the language of senior leadership. It’s a changing role in a changing world. But…

2 min read

What “Beginner” Skills do Security Leaders Need to Refresh?

4 min read - The chief information security officer (CISO) was once a highly technical role primarily focused on security. But now, the role is evolving. Modern security leaders must work across divisions to secure technology and help meet business objectives. To stay relevant, the CISO must have a broad range of skills to maintain adequate security and collaborate with teams of varying technical expertise. Learning is essential to simply keep pace in security. In a CISO Series podcast, Skillsoft CISO Okey Obudulu recently said,…

4 min read