PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
December Volume 17 / No. 10

Swiss Army knife security? How to vet cybersecurity tools suites

Vendors are offering new delivery models for cybersecurity tools as product categories mature and become commoditized. More security technology from a handful of providers can be a good thing. But compilations of cybersecurity tools and services make it hard for enterprises to figure out what some products offer and how these security bundles will integrate with existing controls to improve their overall risk postures. We look at this trend and offer tool assessment and consolidation strategies to help you get the most out of multi-tool platforms that provide an array of modules and services. So, what are the pros and cons of adopting these Swiss Army knife technologies?

There's a growing awareness that migrating virtual workloads to new IT infrastructure requires different levels of protection with security mechanisms built-in. Several third-party vendors now offer ways to secure virtual machines across data center and cloud environments. As cybersecurity tools begin to protect transient workloads across environments, we look at a cross-section of virtualization and cloud security products designed to support this new security model beyond the firewall.

Finally, we continue our new Readers' Top Picks series with a look at application security tools. We asked IT and security professionals which top companies and app security tools their organizations consider when they seek to reduce their application vulnerabilities. Like other cybersecurity tools, the trend going forward is more products that attempt to cover the entire application security space, rather than hone in on key areas -- such as static or dynamic analysis.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close