Security fragmentation needs to end

A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted.

More on network security problems: 10 of the Worst Moments in Network Security History

The stark reality is that security breaches can, will and do happen to everyone. For every security control and process we put in place, somewhere else there's a vulnerability, a weakness, an untrained employee or a path of least resistance for an attack. All the point solutions in the world are not going to make us any more secure. What we desperately need is a new model for integrating security solutions across vendors, across devices, across operating systems and across the globe.

Companies today are faced with a fundamental security conundrum. Their networks, applications and end-user devices are made up of a patchwork of dozens if not hundreds of vendor solutions. Each vendor may offer security features in their apps, security appliances, or even an entire range of security solutions. None of them really interoperate with any of the other vendors' security solutions (not unless you consider LDAP and syslog to be interoperability). None of them work on other vendor network devices. In most cases, security solutions from the same vendor don't even coordinate among themselves. As a result, companies are left with no choice but to try and patch security fragments together and hope nothing slips through the cracks.

To add insult to injury, the vendors continue to unveil the latest and greatest security "vision", pretending the entire world is made up of single vendor deployments, just like their lab. Startups rush in to fill the gaps, re-inventing the wheel for each aspect of their product - building a policy engine, a reporting engine, a set of compliance reports, directory integration and logging - all proprietary, closed and insular. Entire security "sectors" ramp up overnight to address a single new type of attack, creating new categories and solutions so narrowly focused they don't deserve to be features, let alone products or even industry sectors. The larger vendors acquire, re-engineer, absorb and half-integrate the solutions, about two to three years too late to catch up with the bad guys. Rinse and repeat.

Well, it's not working. Consider how much money is spent every year on information security and then look at how easily these attacks seem to be. The victims of security breaches are not just the Internet newbies and rubes, but some of the most sophisticated companies in the world. They suffer breaches despite spending enormous amounts of money, effort and attention on security.

The bottom line is that customers have all the power. Stop buying fragmented security point-solutions and magic bullets. Stop buying proprietary systems. Stop buying "end-to-end" security where both ends (and everything in between) have to be from the same vendor. Challenge insular vendors. Demand open standards and open protocols with support from multiple vendors, or take your money elsewhere. The security industry is broken and only customers can fix it.

Read more about wide area network in Network World's Wide Area Network section.

Join the Good Gear Guide newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securitydata breachlegalanti-malwarecybercrime

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andreas M. Antonopoulos

Network World
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Armand Abogado

HP OfficeJet 250 Mobile Printer

Wireless printing from my iPhone was also a handy feature, the whole experience was quick and seamless with no setup requirements - accessed through the default iOS printing menu options.

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?