Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Security tool consolidation boosts efficiency, threat mitigation
Vulnerabilities

Security tool consolidation boosts efficiency, threat mitigation

Staff WriterBy Staff WriterFebruary 14, 2025Updated:May 17, 2025No Comments2 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Dive Brief:

Organizations that have consolidated security spending into integrated platforms have experienced improved cyber resilience and stronger operational efficiencies, according to a study released Tuesday by IBM and Palo Alto Networks. 
Managing security stacks has been a struggle for organizations, which juggle an average of 83 different security tools from 29 different vendors, according to the study.
More importantly, the “platformization” model reduces the time it takes to identify and mitigate security incidents by an average of 74 days and 84 days, respectively, the study found.

Dive Insight:

The report takes a close look at a controversial push in recent years to consolidate security spending toward platforms that integrate multiple tools. The tradeoff is that this typically entails working with a single vendor. Enterprise security teams have increasingly complained of tool sprawl, where dozens of security tools are deployed across corporate IT networks and deluge security staff with false alerts as the volume of malicious cyberattacks become more powerful and harder to detect. 

Best of breed and integrated should not be mutually exclusive, noted Karim Temsamani, president, next generation security at Palo Alto Networks. Both CIOs and CISOs are in alignment that companies need better and faster security outcomes, he said. 

“It’s under-appreciated how much complexity the number of disparate tools and vendors puts on a security team to fully deploy, integrate and operationalize all of these capabilities, without having gaps,” Temsamani said via email.

The study also showed that organizations that platformized their spending generated four times greater ROI than non-adopters, even though the consolidated users spent less overall. 

“In addition, the study noted security complexity and concerns can hamper an organization’s digital transformation efforts, often deterring innovation and experimentation,” Mark Hughes, global managing partner for cybersecurity services at IBM, said via email. 

The IBM Institute for Business Value conducted the study with Oxford Economics, surveying more than 1,000 executives across 21 industries and 18 countries.

Major security firms such as Palo Alto Networks, CrowdStrike, Microsoft and others have found themselves increasingly competing for large enterprise customers, in a bid to get them to ditch more specialized vendors and instead consolidate their global security spending to a single security provider. 

The competition spiral became an industrywide concern in 2024, as Palo Alto Networks aggressively pursued a strategy by offering deferred payments and other incentives to customers who consolidated their business on its platforms.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChina protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks
Next Article MetricStream Reveals 2025 GRC & Cyber GRC Predictions
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

Critical Vulnerabilities Resolved in Tenable Nessus Agent

June 16, 2025

UNFI Struggles to Recover from Cyberattack Setback

June 13, 2025
Leave A Reply Cancel Reply

Latest Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 20250 Views

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 20250 Views

WestJet Faces Cyberattack: A Major Disruption

June 16, 20250 Views

Critical Vulnerabilities Resolved in Tenable Nessus Agent

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.