October 19, 2015 By Pamela Cobb 2 min read

Do your security products look like the mega-sandwich of the Dagwood cartoon strip, with so many different meats and cheeses and condiments piled up that, while impressive, it’s impossible to consume? Although a potentially delicious solution (sandwich) to a very pressing problem (hunger), this may not be the best way to streamline your threat management operations.

Peanut Butter and Jelly Time

Let’s take the simplicity of the peanut butter and jelly sandwich: two ingredients and some bread. But even within that, there are permutations that can customize it to your particular tastes. Strawberry or grape jelly? White or wheat bread? Crusts on or off?

You can very easily go overboard customizing a simple sandwich instead of focusing on whether the sandwich will meet its most basic goal: satisfying hunger. The same pitfalls can happen when picking security products. If your goal is to stop advanced malware such as the Shifu or Dyre banking Trojans, are your security products really meeting the need? Unfortunately, many of today’s security products are striving to meet multiple needs: compliance standards, data protection, identity management and visibility into the network, to name a few.

Another consideration is whether picking the very best ingredients will make the best possible sandwich. Does your favorite sourdough bread work when paired with your favorite crunchy peanut butter and your favorite condiment of Dijon mustard? Sandwich ingredients, like security solutions, don’t work independently of each other. They have to work together.

Perhaps I’ve overcomplicated the simple sandwich. The good news is what while I may be a horrible cooking show host, I do have something to help demystify integrated security solutions: a new ebook called “Integrated Threat Management for Dummies.” The book covers the basics of evolving threats and gives helpful tips on making the most of prevention, detection and response strategies.

Later chapters drill down further into how to integrate threat protection solutions, as well as how to integrate it with security intelligence solutions. The author very helpfully distills everything down into 10 tips on integrated threat management to tie it all together. Along the way, there are warnings and tips in the standard “for dummies” layout that really net out the important things to know.

Read the complete e-book now to learn more about integrated threat management

More from CISO

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today