Reducing complexity to enhance security: why consolidation is important
Check Point® Software Technologies Ltd. announces new findings from a Dimensional Research survey that examines the attitude of security officials to consolidation. These results show that non-integrated point solutions make corporate security an even more difficult task. With the evolving threat landscape, cyber attacks are becoming more sophisticated, but 99% of companies that use solutions from different vendors say that this creates challenges.
The main findings of the survey of 411 IT and security professionals worldwide are as follows:
• With more resources to secure, confidence in security decreases – 92% of respondents said protecting their IT resources from threats is a challenge. Only 34% and 38% of security managers believe that their mobile devices and connected objects are properly secure, which reveals considerable shortcomings in the security posture of companies.
• Almost half of the companies deploy between 6 and 40 security solutions, which adds to the complexity – Almost all of the companies surveyed use several suppliers of security products. 49% of all companies use between 7 and 40 point security products, and 27% of large companies use between 11 and 40 products from different suppliers.
• Multiple administration consoles obscure visibility – 98% of companies administer their security products with multiple consoles, creating siled visibility. Failure to gain a comprehensive view of threats creates visibility issues, which complicates incident response.
• Working with multiple security providers poses challenges to businesses – 79% of security professionals agree that working with multiple providers poses significant challenges. Maintenance, upgrades, contract renewals, and other tasks to support a security solution all take time and precious resources.
“Some companies assume that using more products means more safety. But in this case, security officials should adopt the opposite “less is better” mentality. [nom], [poste] at Check Point. “Adding multiple products from different suppliers only adds complexity and can potentially compromise security. Businesses need a consolidated cybersecurity solution that strengthens their defenses against any form of attack, while improving their agility. “
The COVID-19 pandemic has completely transformed our work culture. The changes were global, rapid and widespread. Radical changes in your business infrastructure provide a unique opportunity to assess your security investments. In the survey, 69% of respondents agree that favoring the consolidation of suppliers would improve security. The highest level of visibility, achieved through consolidation, guarantees the effectiveness of the security necessary to stop sophisticated cyberattacks. Unified administration and risk visibility strengthen the security architecture.
The reduction in the number of suppliers makes it possible to obtain a higher level of security through better integration, and the reduction of functional deficiencies between the protections offered by each product. They also significantly reduce the time, resources and costs of incident resolution processes. Check Point Infinity is the very first consolidated security architecture across all networks, cloud and mobile, offering the highest level of prevention of known and unknown threats. Infinity’s single administration correlates a wide range of events centrally across all network environments, cloud services, and mobile infrastructures. Check Point’s threat prevention technology blocks the most sophisticated attacks before they inflict damage.
Don’t miss the webinar “A Strategy to Secure Everything Around You” to learn more about Check Point Infinity and how your business can benefit from a consolidated security architecture. Register today
The survey was conducted by Dimensional Research, among 411 professionals from companies with more than 500 employees worldwide.