October 19, 2015 By Pamela Cobb 2 min read

Do your security products look like the mega-sandwich of the Dagwood cartoon strip, with so many different meats and cheeses and condiments piled up that, while impressive, it’s impossible to consume? Although a potentially delicious solution (sandwich) to a very pressing problem (hunger), this may not be the best way to streamline your threat management operations.

Peanut Butter and Jelly Time

Let’s take the simplicity of the peanut butter and jelly sandwich: two ingredients and some bread. But even within that, there are permutations that can customize it to your particular tastes. Strawberry or grape jelly? White or wheat bread? Crusts on or off?

You can very easily go overboard customizing a simple sandwich instead of focusing on whether the sandwich will meet its most basic goal: satisfying hunger. The same pitfalls can happen when picking security products. If your goal is to stop advanced malware such as the Shifu or Dyre banking Trojans, are your security products really meeting the need? Unfortunately, many of today’s security products are striving to meet multiple needs: compliance standards, data protection, identity management and visibility into the network, to name a few.

Another consideration is whether picking the very best ingredients will make the best possible sandwich. Does your favorite sourdough bread work when paired with your favorite crunchy peanut butter and your favorite condiment of Dijon mustard? Sandwich ingredients, like security solutions, don’t work independently of each other. They have to work together.

Perhaps I’ve overcomplicated the simple sandwich. The good news is what while I may be a horrible cooking show host, I do have something to help demystify integrated security solutions: a new ebook called “Integrated Threat Management for Dummies.” The book covers the basics of evolving threats and gives helpful tips on making the most of prevention, detection and response strategies.

Later chapters drill down further into how to integrate threat protection solutions, as well as how to integrate it with security intelligence solutions. The author very helpfully distills everything down into 10 tips on integrated threat management to tie it all together. Along the way, there are warnings and tips in the standard “for dummies” layout that really net out the important things to know.

Read the complete e-book now to learn more about integrated threat management

More from CISO

CISO vs. CEO: Making a case for cybersecurity investments

4 min read - Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets.For example, at RSA Conference 2024, a roundtable discussion about issues facing the cybersecurity industry, one CISO stated bluntly that budgets — or lack thereof — are the biggest problem. At a time when everything is…

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today