Intelligent CISO Issue 41 | Page 38

FEATURE
propositions and capabilities of different solutions are often alike . Evaluating the efficiency of a solution is also a relatively complex task , during which several factors need to be taken into consideration ,” he advised . “ Additionally , the discussion around choosing a solution often focuses on issues of economics , rather than understanding what the solution delivers .”
Shane Grennan , Channel Director Middle East , Fortinet , said that to effectively address today ’ s advanced threats , organisations require visibility and control across their entire distributed networks .
Grennan believes that while many security solutions are limited in terms of their capabilities , extended detection and response can help fill the gap . “ Organisations must bring together all their security tools in a single location for enhanced visibility . For example , they can consolidate network security , endpoint security , email security and cloud security monitoring in a single platform to ensure the whole is greater than the sum of its parts ,” he said .
“ This enables solution providers to deliver a differentiated customer offering that improves security posture while reducing security operations overhead .”
Even before the implementation , when evaluating an endpoint solution , resellers should consider different key factors in choosing the right vendor .
Attack surface
According to Grennan , man vendors ’ solutions do not cover the entire attack surface , instead , they focus on securing one or a few different attack vectors individually , such as cloud , email or endpoints and call it XDR or extended detection and response . “ When this is the case , XDR cannot demonstrate its true value , which lies in its ability to combine components across multiple attack vectors ,” he said . “ Secondly , even though they may offer a full range of security products and solutions , vendors that have acquired these components ( especially ones with large install bases ) individually over time may lack the resources and commitment for tight integration needed for higher-value analytics and automation .
“ Third , vendors seem to focus on extended detection and extended response , skipping over the middle stage of investigation and validation . As a result , human security professionals still have significant effort ahead of them , especially as threat and alert volumes continue to grow .”
Pitfalls to avoid
With endpoint protection management the number one priority for many organisations in MEA , what pitfalls
38 www . intelligentciso . com