Intelligent CISO Issue 24 | Page 15

latest intelligence THE SECRETS OF EVALUATING SECURITY PRODUCTS hoosing the right security C products to suit your business is a serious problem. The risk of being compromised is real and there is a lot at stake. The cybersecurity landscape has changed significantly in the past decade. This book puts that into context and explains why modern challenges require next-generation tools. However, this book is not simply a discussion of trends; it will provide you with a methodology to help you execute the product evaluation process. Starting with mapping your business needs, we explain step-by-step how you should determine those needs and what solutions would work best for you. Then we break down success criteria validation, looking in detail at drivers from the perspectives of business management, security needs and operational requirements. The interplay of these drivers must be carefully managed to achieve a good product fit. A walkthrough of the evaluation process follows, with practical tips on where to start, pitfalls to avoid and how to create success criteria that suit your business. There are detailed checklists in the appendices that will further support this process. Finally, we close with a head-to-head discussion between the authors, one who approaches the issue of security tool evaluation from the perspective of a vendor and the other who addresses the process from a CISO’s point-of-view. We hope that the resulting discussion adds some enlightening points and provides an enjoyable close to the book. u PRESENTED BY DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS www.intelligentciso.com | Issue 24 15