latest intelligence
THE SECRETS OF
EVALUATING
SECURITY PRODUCTS
hoosing the right security
C
products to suit your
business is a serious
problem. The risk of being
compromised is real and there is a lot at
stake. The cybersecurity landscape has
changed significantly in the past decade.
This book puts that into context and
explains why modern challenges require
next-generation tools.
However, this book is not simply a
discussion of trends; it will provide
you with a methodology to help you
execute the product evaluation process.
Starting with mapping your business
needs, we explain step-by-step how you
should determine those needs and what
solutions would work best for you.
Then we break down success criteria
validation, looking in detail at drivers
from the perspectives of business
management, security needs and
operational requirements. The interplay
of these drivers must be carefully
managed to achieve a good product fit.
A walkthrough of the evaluation process
follows, with practical tips on where to
start, pitfalls to avoid and how to create
success criteria that suit your business.
There are detailed checklists in the
appendices that will further support
this process.
Finally, we close with a head-to-head
discussion between the authors, one
who approaches the issue of security
tool evaluation from the perspective of a
vendor and the other who addresses the
process from a CISO’s point-of-view. We
hope that the resulting discussion adds
some enlightening points and provides
an enjoyable close to the book. u
PRESENTED BY
DOWNLOAD WHITEPAPERS AT:
WWW.INTELLIGENTCISO.COM/
WHITEPAPERS
www.intelligentciso.com | Issue 24
15