By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
This is difficult to answer in general terms because, like so many things in IT, "it depends." It depends on the specific applications or appliances, as well as your organization's goals, tolerance for risk and resources. As Bruce Schneier says, "complexity is the enemy of security," but a defense in depth (or a layered approach) is also required. Does the use of an integrated product truly reduce complexity in your situation? Does its use reduce your security layers, because one successful attack against the product will compromise multiple layers? Does it add layers and reduce complexity at the same time -- a clear win? Only you can answer those questions for your environment.
Dig Deeper on Enterprise Risk Management: Metrics and Assessments
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.