Security Resources and Information from TechTarget 09月29日
安全供应商整合的益处与挑战
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

随着40%的组织已开始整合网络安全工具和供应商,网络安全主管(CISO)需评估其供应商组合。整合的益处包括简化管理、降低成本、提升安全性和加强供应商关系,但需警惕锁定风险和单点故障。CISO应通过制定供应商清单、能力矩阵和评估合同条款来系统化整合,平衡操作、战略和财务需求,确保资源优化配置。

🔍 CISOs需评估现有及潜在供应商,通过减少工具和供应商数量实现整合,以简化管理、降低成本并提升整体安全性,同时需警惕过度依赖单一供应商带来的锁定风险。

📊 整合带来的操作优势包括管理复杂性降低、学习曲线平缓、效率提升和供应商支持简化;战略优势涵盖更强的供应商关系、合同谈判时间缩短、合规简化;财务优势则体现在许可费和运维成本降低,以及消除工具冗余和闲置浪费。

🛠️ 实施整合需系统化步骤:先建立全面的供应商清单和能力矩阵,识别重叠产品并填补功能空白,评估供应商合作关系;随后调研各供应商的成本、声誉、支持服务、功能特性及合同条款,重点关注价格变动、支持响应时间和合同终止条件,确保决策科学合理。

🚧 挑战在于可能形成安全覆盖盲区、管理难度增加和人员培训需求,需通过制定应急预案、加强内部沟通和选择灵活合同来规避风险,平衡短期成本与长期安全需求。

<p>There's a staggering array of cybersecurity vendors in the market today. Like with all security controls and tools, CISOs should assess whether they need every vendor they use currently -- and might use in the future.</p><div class="ad-wrapper ad-embedded"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div> <p>In some cases, these assessments lead to vendor consolidation -- the process of strategically reducing the number of vendors in use for operational and strategic benefits, financial advantages and security improvements.</p> <p>Let's examine the benefits and challenges of security vendor consolidation and explore how CISOs can assess their vendor portfolio.</p> <p>Remember that the "right" number and types of vendors for cybersecurity products and services are subjective. What works for one company might not for another. CISOs should weigh the factors covered below when deciding on the balance that works for their organization.</p> <section class="section main-article-chapter" data-menu-title="Benefits and challenges of security vendor consolidation"> <h2 class="section-title"><i class="icon" data-icon="1"></i>Benefits and challenges of security vendor consolidation</h2> <p>Forty percent of organizations have already begun to consolidate their cybersecurity tools and vendors and an additional 21% are planning on it, according to the "2025 Fortra State of Cybersecurity Survey Results."</p> <p>Benefits of security vendor consolidation include the following:</p> <ul class="default-list"> <li><b>Operational benefits.</b> For example, reduced management complexity, easier learning curve with fewer tools, improved efficiency and simplified vendor support.</li> <li><b>Strategic benefits.</b> Such as stronger vendor relationships with less time spent negotiating contracts, services and overall cost, and simplified compliance.</li> <li><b>Financial advantages.</b> For example, minimized licensing fees and decreased maintenance costs. Eliminating <a href="https://www.techtarget.com/searchsecurity/tip/Too-many-cloud-security-tools-Time-for-consolidation"&gt;tool sprawl</a> and shelfware -- tools being paid for that aren't being used -- also saves money in already tight <a href="https://www.darkreading.com/cybersecurity-operations/navigating-cybersecurity-budget-tug-of-war"&gt;cybersecurity budgets</a>.</li> <li><b>Security improvements.</b> Including improved visibility, streamlined threat management and improved control over the entire attack surface.</li> </ul> <p>Security vendor consolidation isn't without challenges, however. Roadblocks include risk of vendor lock-in, introducing single points of failure, creating security coverage gaps, management complexity and staff training challenges.</p></section> <section class="section main-article-chapter" data-menu-title="How to begin security vendor consolidation"> <h2 class="section-title"><i class="icon" data-icon="1"></i>How to begin security vendor consolidation</h2> <p>Reducing tool and vendor sprawl is a daunting task. To lay the groundwork for consolidation, CISOs and their teams should consider the following:</p> <ul class="default-list"> <li>Evaluate the company's needs for cybersecurity tools, features and services and align vendors and service providers with those needs.</li> <li>Compare and consolidate existing and new vendors, particularly as market consolidation and vendor feature expansion bring new features and capabilities into play.</li> <li>Prepare for acquisitions, business failures and other vendor changes in existing contracts to minimize potential risk.</li> <li>Anticipate common vendor challenges and inevitable issues that might arise during contract timeframes.</li> </ul> <p>To start security vendor consolidation, CISOs and their teams should do the following:</p> <ul class="default-list"> <li><b>Develop a thorough vendor inventory.</b> List all the cybersecurity vendors in use at the organization.</li> <li><b>Build a capabilities matrix.</b> List required features and functionality, as well as any non-negotiables.</li> <li><b>Identify vendor and product overlaps.</b> Document significant overlap in products and services.</li> <li><b>List new needs.</b> Identify any missing tools, services and capabilities.</li> <li><b>Assess vendor relationships.</b> Consider which vendors are easier to work with than others. For any problematic relationships, ask if the partnership is worth continuing.</li> </ul> <p>After discussing these criteria, CISOs and their teams should research and document each vendor's costs, reputation, support, features and capabilities, and contracts.</p> <h3>Costs</h3> <p>Vendor tools and services should be as cost-effective as possible. When renewing products or introducing new options with existing contracts, be prepared for price hikes, licensing changes, costs out of line with other leading services, hidden costs and unanticipated service charges.</p> <h3>Vendor reputation</h3> <p>A vendor's reputation could change for many reasons, including poor online reviews or social media feedback, cultural issues, breaches and <a href="https://www.techtarget.com/searchsecurity/news/366596532/Microsoft-Faulty-CrowdStrike-update-affected-85M-devices"&gt;security incidents</a>, <a href="https://www.cybersecuritydive.com/news/palo-alto-networks-buy-cyberark-25-billion/756393/"&gt;acquisitions and mergers</a>, major or continuous vulnerability announcements, or financial woes.</p> <h3>Vendor support</h3> <p>When evaluating vendors, CISOs need to define their support expectations early in negotiations. Measure service-level agreements and expectations with existing vendors to see whether this is a problem area, and document both positive and negative support experiences. Note sudden changes in support policy or fulfillment, as well. For cybersecurity platforms and products, it's critical that support is timely and knowledgeable.</p> <h3>Features and capabilities</h3> <p>While evaluating controls and comparing functionality is important, it's also integral to focus on the vendor commitment aspect. Hold smaller vendors and startups to roadmap commitments contractually, and if a contract was negotiated based on promises of a feature, put hard dates and expectations in place within contracts.</p> <h3>Contracts</h3> <p>Negotiating contracts and working with procurement teams are <a href="https://www.techtarget.com/searchsecurity/tip/How-to-choose-a-cybersecurity-vendor-Key-criteria"&gt;focus areas of vendor evaluation</a> today. One consideration is contract length. Shorter contracts are less risky but usually cost more. At the same time, CISOs can usually negotiate lower contracts for a yearly cost, but this might lock them into a longer term with a potentially unsatisfying relationship.</p> <p>For smaller, lesser-known vendors, it's best to opt for shorter contracts. Longer contracts might be offset by negotiating termination clauses that outline performance issues or other negatives in the relationship, but this is highly dependent on what the vendor does. To that end, carefully consider performance expectations as thoroughly as possible before signing new vendors.</p> <p><i>Dave Shackleford is founder and principal consultant at Voodoo Security, as well as a SANS analyst, instructor and course author, and GIAC technical director.</i></p></section>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

安全供应商整合 CISO管理 网络安全成本优化 工具冗余 合同谈判
相关文章