In an increasingly digital world, companies continuously face the threat of cyberattacks. Current advances in artificial intelligence (AI) promise significant improvements in detecting and defending against such threats.

However, it is no secret that attackers are increasingly using AI. Cyber criminals leverage AI and machine learning to optimize and automate attacks. AI-driven malware can quickly adapt to new security measures and exploit vulnerabilities in real time. These AI tools enable cyber criminals to scale their attacks and employ highly complex methods to bypass traditional security mechanisms and remain undetected. Additionally, attackers use advanced algorithms to make phishing attacks more precise.

In this context, Palo Alto Networks (PANW) recently announced the acquisition of IBM’s QRadar Software-as-a-Service (SaaS) business. This marks the second merger in the traditional security information and event management (SIEM) market this year, following the merger of Exabeam and LogRhythm. These developments followed Cisco’s earlier acquisition of Splunk.

Amidst these dynamic market conditions, choosing a future-proof technology architecture for threat management becomes almost inevitable. This underscores the necessity of selecting the best technologies and the right strategic approach.

There are two approaches: deploying the best individual solution or integrating a comprehensive platform.

Best-of-breed approach

The best-of-breed approach allows companies to select the best product for each security area. This results in a tailored solution optimally aligned with individual requirements and business processes. The main advantages include:

Specialized products: Companies can choose from various providers and select those that offer the best solutions for their needs. For example, a company might choose a leading SIEM solution from one provider and a highly specialized endpoint detection and response (EDR) solution from another to ensure all aspects of their security architecture are optimally covered.

Flexibility and agility: The best-of-breed approach allows companies to respond flexibly to new threats and changes in business requirements. When a new technology comes to market, companies can easily integrate it without overhauling their entire security architecture. This promotes agile adaptation and quick implementation of new solutions to stay current with the latest technology.

Avoid vendor lock-in: Companies avoid dependence on a single vendor by using products from various providers. This reduces the risk of being tied to a suboptimal solution if the company’s requirements change or the vendor encounters problems. Companies can easily replace products and integrate new vendors without significantly changing their infrastructure.

Best-of-breed challenges

Despite these advantages, the best-of-breed approach also has some drawbacks:

Integration complexity: Integrating products from different providers can be technically challenging and time-consuming. Different systems must be able to communicate and exchange data, which can lead to interoperability issues. This technical complexity can extend the implementation time to ensure all systems work seamlessly together.

Increased resource requirements: Operating and managing a heterogeneous security infrastructure requires specialized expertise and continuous training. Employees need to be able to work with various systems and technologies, increasing the demand for specialized security professionals. This can lead to higher operational costs as training and system management require more time and resources.

Costs: Procuring the best available technologies can be expensive. In addition to high acquisition costs, maintenance and license fees can also be significant. Companies must carefully weigh whether the improved security benefits justify the additional costs or if more cost-effective, less specialized solutions would suffice.

Explore IBM’s threat management services

Platform approach

A platform offers an integrated solution provided by a single vendor. This has several advantages:

Seamless integration: All platform components are aligned from the start and work harmoniously together. This facilitates interoperability and data exchange between the various platform modules. Companies benefit from a unified view of their security posture and can detect and respond to threats quickly and efficiently.

Automation and efficiency: Security processes can be automated and centrally managed with a single user interface. This enables faster responses to threats and reduces the manual effort required from security staff. Automated workflows allow routine tasks to be performed more quickly and consistently, enhancing overall operational efficiency.

Reduced complexity: Managing an integrated platform is less complex than managing multiple independent systems. This reduces the training requirements for security staff and minimizes the risk of errors arising from the complexity of integrating different systems. A unified platform allows security teams to focus on strategic security initiatives rather than dealing with technical integration issues.

Cost efficiency: A unified platform can often lead to lower overall costs as the need for multiple separate licenses and maintenance contracts is eliminated. Companies can benefit from bundled discounts and better control their expenditures. Additionally, management costs are reduced as fewer resources are required for system integration and management.

Platform challenges

Just as best-of-breed approaches are not a perfect solution, using a platform is not without challenges:

Limited functionality: There is a risk that a single platform’s functions will not cover all of a company’s specific security requirements. Some specialized security functions might be missing or less mature than with best-of-breed solutions. Companies must ensure that the chosen platform meets all critical requirements and does not leave significant gaps in their security strategy.

Vendor lock-in: Dependence on a single vendor can be problematic if the vendor encounters difficulties, such as financial issues, lack of innovation or poor customer service. Switching to another vendor can be expensive and time-consuming, as almost the entire security architecture needs to be rebuilt. Companies should carefully weigh the risk of vendor lock-in and develop strategies to minimize this risk.

Multiple stakeholders: Opting for a platform solution may require more coordination within the company, as different departments and stakeholders need to be involved. This can prolong the decision-making process and require additional resources to consider all stakeholders’ needs. Careful planning and coordination are necessary to implement the platform successfully.

Choosing future-proof technology architecture

The decision to choose a best-of-breed approach or a platform depends on several factors, such as the company’s specific security requirements, budget, internal expertise and long-term strategy. While best-of-breed solutions offer greater flexibility and specialized functionalities, the platform approach enables seamless integration and reduced complexity.

Ultimately, the choice should efficiently meet the company’s security goals. It is crucial to invest in advanced technologies and ensure that expenditures are proportionate to the risk. This means that investments should be carefully weighed without incurring unnecessary costs.

IBM can help you develop the optimal threat management strategies, processes and architectures to address your security challenges. Check out our Cyber Threat Management Services website.

More from Risk Management

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Roundup: The top ransomware stories of 2024

2 min read - The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure and supply chains, raising the stakes for victims and increasing the motivation to cooperate.Here are the biggest ransomware stories of 2024.Ransomware payments reach record highRansomware payments surged to record highs in 2024. In the first half of the year, victims…

83% of organizations reported insider attacks in 2024

4 min read - According to Cybersecurity Insiders' recent 2024 Insider Threat Report, 83% of organizations reported at least one insider attack in the last year. Even more surprising than this statistic is that organizations that experienced 11-20 insider attacks saw an increase of five times the amount of attacks they did in 2023 — moving from just 4% to 21% in the last 12 months.With insider threats on the rise, it’s critical for businesses to recognize the real dangers that originate from inside…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today