ibm -獲取網(wǎng)絡安全紅利 - 安全平臺如何創(chuàng)造商業(yè)價值 Capturing the cybersecurity dividend How security platforms generate business value_第1頁
ibm -獲取網(wǎng)絡安全紅利 - 安全平臺如何創(chuàng)造商業(yè)價值 Capturing the cybersecurity dividend How security platforms generate business value_第2頁
ibm -獲取網(wǎng)絡安全紅利 - 安全平臺如何創(chuàng)造商業(yè)價值 Capturing the cybersecurity dividend How security platforms generate business value_第3頁
ibm -獲取網(wǎng)絡安全紅利 - 安全平臺如何創(chuàng)造商業(yè)價值 Capturing the cybersecurity dividend How security platforms generate business value_第4頁
ibm -獲取網(wǎng)絡安全紅利 - 安全平臺如何創(chuàng)造商業(yè)價值 Capturing the cybersecurity dividend How security platforms generate business value_第5頁
已閱讀5頁,還剩54頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

IBMInstituteforBusinessValue|ResearchInsights

Capturingthecybersecuritydividend

Howsecurityplatformsgeneratebusinessvalue

palog'

HowIBMandPaloAltoNetworkscanhelp

IBMConsultingandPaloAltoNetworkshavejoinedforces

todeliverAI-powered,fullyintegrated,open,end-to-endsecurity

solutionstoenterprises.Fromconsultationthroughexecution,

wecanhelpyoumodernizeyourcybersecurityprogram,savingtime,money,andresourcesaswellasenhancingyourorganization’s

resilienceagainsttoday’scomplexthreats.Formoreinformation,visit

/consulting/palo-alto

.

ForewordOrganizationsaroundtheglobearefacingapivotalmoment

insecurity—onethatrequiresurgentaction.

Digitalconnectivityexpandsattacksurfacesandcreatesnewvulnerabilities.Cyberattacks

arebecomingmoresophisticatedandhardertodefendagainst.AndAIisbeingusedbybothdefendersandattackers,creatingaraceincybersecuritycapabilities.

Cybersecuritytoolsandsolutionsabound,mostpromisingsomesortofseachange.Inrealitythough,manydeliveronlyarippleor,atbest,apassingwave.Why?Complexityisgettinginthewayofresults.

Thecybersecuritylandscapehasalwaysbeenacomplexwebofthreatsandcountermeasures.

Buttheproliferationofthreatsandthemind-bogglingnumberofpotentialresponsestodayisenoughtorobaChiefInformationSecurityOfficerorChiefTechnologyOfficerofsome

much-neededsleep.Organizationsjuggleanaverageof83differentsecuritysolutionsfrom29vendors.It’sunnecessaryconvolutionandrisk.Moretoolsequalmorethreats;every

integrationisapotentialpointofentryforbadactors.

Intoday’sworld,effectivesecurityrequiresplatformization.Platformizedorganizations

take72daysless,onaverage,todetectasecurityincidentand84dayslesstocontainone.Consolidatingmultipletoolsintoaunifiedplatformnotonlybolsterssecurityposture,italsoreducescostsandimprovesoperationalefficiency—twothingsanyC-suiteexecutiveor

businessleaderwillwelcome.AndwhenitcomestoAI,aplatformapproachbestenablesanorganizationtoingestandanalyzedata,andthendeliveractionableinsights.

Ourrolesgiveusanopportunitytoengagewithorganizationsfromeveryindustryand

geography,providingusaviewfromthesecuritymountaintop—andweseethatwaiting

isariskygame.Thisisn’tjustaboutfuture-proofing,it’saboutsafeguardingthepresent.

Imaginesecuritytoolsthatharmonizeseamlessly,sharingintelligenceandautomating

responsesatanunprecedentedspeed.ThisvisionisalreadyarealityformanyorganizationsthathaveplatformizedtheirsecuritysincePaloAltoNetworksintroducedtheconcept

oneyearago.

Securityplatformsofferunparalleledvisibility,strengtheneddefenses,improvedcosts,

andefficiency—allleadingtotangiblebusinessbenefits.Arobust,integratedsecurityplatformcanbetheshieldthatprotectsyourorganization’sreputation,customertrust,andbottomline.

Intoday’sAI-fueledworld,strongpartnershipsaremoreessentialthanever.Thestrategic

partnershipbetweenIBMandPaloAltoNetworksbringstogetherleadingsecurityplatform,

AI,andtransformationcapabilities.Collaboratingonthisreport,wehaveidentifiedwhatittakestosuccessfullypivottosecurityplatformizationandwhatitcandeliverforyourorganization.

Together,weareuniqueinourabilitytohelpyouembracethisopportunityandbethebestpartnersforyou.

MohamadAli

SeniorVicePresidentandHeadIBMConsulting

BJJenkinsPresident

PaloAltoNetworks

1

2

Key

takeaways

52%ofexecutivessay

complexityisthebiggestimpedimenttotheir

cybersecurityoperations.

Securityfragmentationisnowtheunhappynorm.

Theaverageorganizationhas83differentsecurity

solutionsfrom29vendors.Amajority,52%,ofexecutivessaycomplexityisthebiggestimpedimenttosecurityoperations.

SecurityplatformsbringfasterresponsetimesandhigherROI.

Platformizedorganizationstake72daysless,on

average,todetectasecurityincident,and84days

lesstocontainone.TheyalsoreapanaverageROI

of101%,comparedto28%forthosethatarenotyetembracingplatformization.

Platformizationmovesthesecurityfunctionfrom“necessarycost”

tovaluegenerator.

96%ofexecutivesinoursurveywhohaveadoptedplatformizationsaysecurityisasourceofvalue,

comparedtojust8%ofthosewhohaven’t.

Theaveragecostofsecuritycomplexityismorethan

5%

ofannualrevenue.

Cybersecurityshouldboostthebottomline

Asthedigitallandscapecontinuestochange,organizationsfaceadauntingreality:cybersecuritycomplexityiseatingawayattheirbottomline.

Infact,cybersecurityismoreexpensivethanever.Theaverage

costofadatabreachrose10%in2024,toanall-timehighof$4.88million.1Andwhenagrowingthreatlandscapeisaddressedwith

moresecuritysolutions,anorganization’soverallsecuritycostsrisesignificantly,withcybersecurityspendingexpectedtogrowmore

than50%from2023to2025.Meanwhile,80%ofexecutivesagreetheyfacepressuretoreducethecostofsecurity.

Theillusionof“moresolutions,moresecurity”

Manyorganizationshavecontinuedtoaddtotheirstableofsecuritysolutions,hopingtoplugholesastheybecomeapparentandas

threatsincrease.Butourresearchshowsthisapproachisnotapathtosuccess—instead,itaddscomplexityandinefficiency.There’s

alimittohowfaryoucangetbyaddingmoresecuritysolutions.

Thatstrategygraduallydilutesthebenefitsofeachnewsolutionandultimatelyreducessecurityeffectiveness(seeFigure1).

Sowhatisthesolution?Whereisthereopportunity,whatmodels

exist,andwhatlessonscantheyteach?Toexplorethesequestions,theIBMInstituteforBusinessValue(IBV)partneredwithPaloAltoNetworkstosurvey1,000executivesinvolvedinsecurityacross

21industriesand18countries.Theresultsprovidedsomeclearopportunitiesandactionablelessons.

Tellingly,52%ofexecutivessaycomplexityisthebiggestimpedimenttotheircybersecurityoperations.Whenaskedtoestimatethetotal

impactofsecuritycomplexitytotheirbusiness,responsesfrom

C-suiteexecutivesonthesecurityfrontlinewerestartling.Basedon

“Cybersecurityis

theirresponses,theaveragecostofsecuritycomplexityismorethan

apermanentrace.”2

5%ofannualrevenue.Foracompanywith$20billioninannual

HanukStars

revenue,that’sa$1-billionannualcosttothebusinessresultingfrom

Memberoftheboard,IT&Data

securityincidents,inefficiencies,faileddigitaltransformationefforts,

VolkswagenAG

stalledAIinitiatives,lossofcustomertrust,andreputationaldamage.

3

4

FIGURE1

Platformsbringfewerpointsolutions,moreeffectivesecurityoverall

Security

100%

50%

effectiveness

With

platformization

Riskgap

Risksremaindueto

spend,capacity,and

complexityconstraints

Without

platformization

050100

Numberofsecuritysolutions

Thesecuritybusinesschallengefacingmanyleaders:

Securitycomplexity

Asthenumberofsecurity

Thisresultsinadynamic

directlyimpactsbusiness

solutionsproliferates,more

wherecomplexityfeedsitself

factorslikeROI.

spendisrequiredtoachievefeweroutcomes.

andleaderscanneverspend“enough”oncybersecurity.

5

Anantidotetothecostsofsecuritycomplexity

Byaddressingcomplexity—strategicallyconsolidatingandintegratingsecurity

solutionsontoacommonplatform—organizationscandramaticallylowertheirrisk

posture,reducetheircosts,andunlockimprovedbusinessopportunities.Wecallthissecurityplatformization—andourresearchshowsadistinctconnectionbetween

platformizationandpositivebusinessandsecurityoutcomes(seeFigure2).

FIGURE2

Platformusersgainpracticalbenefits

atalllevels

280%

morelikelytohaveaddresseddigital

transformationlimitationsfromfragmentation

Digital

transformation

IT/ISIntegration

Nearly

3X

morelikelytohaveaddressedIT/ISintegrationlimitations

fromfragmentation

275%

morelikelytohaveaddressedsecuritytransformation

limitationsfromfragmentation

SOCoperators

Almost

3X

morelikelytouseAIand

automationtorelievepressureonsecurityanalysts

Securitystrategy&operations

70%

lesslikelytoreportworkloadincreasesfromfragmentation

There’sabetterwaytoapproachsecurity

Thisreportoutlineshowashiftinstrategicapproachtosecurity

platformizationcangeneratebenefits,plusdelvesintothesignificantimpactsplatformizationcanhaveonAIinitiatives.Inaddition,we’ll

offeraguidetorealizetheseimprovements.

Currentsecurity

approachesarenotapathtosuccess

80%

ofexecutivesagreetheyfacepressuretoreducethecostof

securityevenasnewthreatsemerge.

74%

ofexecutivesagreethat

thecurrentworkloadontheir

securityoperatorsisexcessive.

52%

ofexecutivesagreethat

fragmentationoftheirsecuritysolutionsislimitingtheirabilitytodealwiththreats.

6

7

Perspective

Howweanalyzedtheimpactofsecurityplatforms

Toassesstheroleofsecurityplatformizationinoverallsecurityandbusinessperformance,weanalyzedthe1,000organizationsinoursurveyset.Wedevelopedanindexofsecurityplatformizationbasedonfourkeycriteria:

–Simplification.Howgreataroledoesconsolidationplayinsecuritystrategy?

–Portfoliorationalization.Howconsolidatedaresecuritytoolsandtechnologies?

–Proactivehousekeeping.Howwellandregularlyareoutdatedsecuritysolutionsidentifiedandremoved?

–Platformingprogress.Towhatextentaresecurityplatformsadopted?

Foreachcriterion,executivesansweredascaledquestionassessingtheirprogress.Theplatformizationindexwascreatedasasimpleaverageoftheirscoresoneach

ofthefour.

Throughoutthisreport,weillustratetherelationshipbetweenplatformizationindexscoresandperformanceviascatterdiagramsorbysegmentingthe1,000executivesintoquartilesbasedontheirindexscores.Thetopquartilereferstotheorganizationswiththehighest

platformizationindexscores,whilethebottomquartileconsistsoftheorganizationswith

thelowestplatformizationindexscores.Butit’snotwhereorganizationssitontheindexthatisthenuggetofgoldinthisresearch—rather,it’stherelationshipbetweenplatformization

andvariouspositiveoutcomes.

Keytakeaways

fromtheanalysis

Ouranalysisrevealsastrongcorrelationbetweentheplatformizationindexandkeysecurityperformancemetrics.Organizationswithhigherplatformizationscoresdemonstrate:

–Fasterincidentresponse.Platformizedorganizationstake72daysless,onaverage,todetectasecurityincident,and84dayslesstocontainone.

–ImprovedROI.AnaverageROIof101%comparedto28%forthosethatarenotyetembracingplatformization.Platformizationexplains48%

ofthevariationinROI.

–Enhancedreturnonsecurityinvestment(ROSI).AnaverageROSI

of116%comparedto32%forthosethatarenotyetembracing

platformization.Platformizationexplains49%ofthevariationinROSI.

Inshort,thedataindicatessecurityplatformizationhelpsdriveimprovedperformanceandoptimizesthevalueofsecurityinvestments.

Platformizedorganizationstake

72

84

daysless,onaverage,todetect

asecurityincident,anddayslesstocontainone.

8

“Whenwedidallthemath,weactuallyknockedourcostdownbyseveral

hundredthousanddollarsperyear.Ifyoulookedatallthecomponentsthat

wereincluded,wewereabletosayit’snotonlydowegetmore,butwepayless.”

JerryCochran

DeputyChiefInformationOfficer;DivisionDirector,Cybersecurity&DigitalOpsPacificNorthwestNationalLaboratory(US)

9

“Oneofthemainbenefitsofthesecurityplatformisthatourproviderhasaroadmap.Wecanalignourstrategytocapitalizeonthat.

Wegainefficienciesbecauseoursecuritypartnerisshowingushowthesolutionwillevolve.Theyaremakingtheinvestmentsnecessarytodeveloptheplatformandintegratethedifferentcapabilities.”

JavierTorresAlonso

ChiefInformationSecurityOfficer,Allfunds

Digitaltransformation

Digitaltransformationandplatforms:Abusinessperformanceboost

Rethinkingrisk

Thinkaboutalargeconstructionprojectwithmultiplecontractors,eachusing

theirowntools,materials,andblueprints.Whileeachcontractormightbeskilled,coordinatingtheireffortswithoutaunifiedplanandsharedresourcescanlead

todelays,inefficiencies,andpotentialsafetyhazards.

Thecurrentstateofcybersecurityissimilar.Organizations

haveaccumulatedsecurityproductsandservicesovertimeonatool-by-toolbasis.Eachhasitsowndashboards,datamodels,

trainingneeds,andmore.Ourresearchshowsthatenterprisesjuggle

anaverageof83differentsecuritysolutionsfrom29vendors,creatingatangled,expansivemessthatfrustratessecurity

professionalsandhindersoveralleffectiveness.

Securityplatformizationistheequivalentofunifyingtheconstructionunderasinglegeneralcontractor,withstandardizedequipmentandprocedures.Platformizationeliminatesunnecessaryrepetitionof

work,simplifiesoperations,andempowerssecurityteamstofocusonstrategicinitiatives.

Thebenefitsarecompelling.Organizationsinourstudythathave

madestridestowardplatformizationreportsubstantiallyfewer

incidentsanddatabreaches.Theirmeantimetoidentify(MTTI)ordetectsecurityincidentsis72daysshorter,whilemeantimeto

contain(MTTC)—thetimeittakestoresolveanincident—is84daysless.Also,80%ofplatformizationadoptersinourresearchsaytheyhavefullvisibilityintopotentialvulnerabilitiesandthreats,versus

only28%ofnon-adopters.

Ourresearchshows

thatenterprisesjuggleanaverageof

differentsecuritysolutionsfrom

83

vendors.

29

FIGURE3

10

Organizationswiththegreatestsecurityplatformmaturityarefastertoidentifyandcontain

securityincidents

Meantimeto

identify(MTTI)

250

200

150

100

50

0

-2.00-1.000.001.002.00

Platformizationindexscore

Meantimeto

contain(MTTC)

250

200

150

100

50

0

-2.00-1.000.001.002.00

Platformizationindexscore

11

FIGURE4

Platformizedorganizationsseegreaterbusinessimpactfromtheircybersecurityinvestments

%ofrespondentsindicatingtheircybersecurityinvestmentshavegeneratedsigni?cant

improvementsinrevenuegeneration

Bottomquartile

Secondquartile

Third

quartile

Top

quartile

73%

2%

6%

27%

Revenuegenerationandefficiency

Securityplatformizationcanfurtherbusiness

goals.Infact,inourresearch,sevenoutof10

organizationswithahighdegreeofplatformizationreportthatcybersecurityinvestmentshavehelpedrevenuegenerationandoperationalefficiencies.

Only2%ofexecutivesfromorganizationsthathaveyettomovetowardplatformizationsaythesame.

Thisadvantagecomesinpartfromenhancedagility.Manydigitaltransformationeffortscanbederailedbysecurityconcerns.Yetamongplatformusers,

only10%ofdigitaltransformationinitiativesfailtoscaleduetosecurityconcerns,comparedto26%fornon-platformusers.

What’smore,platformizationaidsinnovationinitiatives.Toooften,inthenormalcourseof

business,cybersecurityisrelegatedtotherole

ofgatekeeper—alastlineofdefensethatslows

downresponsivenessanddetersexperimentation.

Incontrast,organizationsinourstudythatuseintegratedsecurityplatformshavegreater

visibility,control,andaccesstoautomation.

Thathelpstransformsecurityfromacostcentertoavaluedriver.

Infact,96%ofexecutivesinoursurveywhohaveadoptedplatformizationsaysecurityisasourceofvalue,comparedtojust8%ofthosewhohaven’t.

%ofrespondentsindicatingtheircybersecurityinvestmentshavegeneratedsigni?cant

improvementsinoperationalef?ciencies

Bottomquartile

1%

Secondquartile

2%

Third

quartile

19%

Top

quartile

68%

7outof10

organizationswithahighdegreeof

platformizationreportthatcybersecurity

investmentshavehelpedrevenuegenerationandoperationalefficiencies.

Only2%

ofnon-platformizedorganizationsreportthesame.

Actionguide

Rationalizeyoursecuritytoolset.Establish

aworkinggroupwithyoursecurity,technology,andbusinessleaderstoevaluatetheimpact

ofsecuritycomplexityonkeyperformancemetrics.Conductacomprehensivesecuritytoolsetassessment,includingacost-benefitanalysisofeachtool.Identifyredundancy,

gaps,andopportunitiesforconsolidationorreplacement.

Pivottoaplatform-firstapproach.Engagetherightpartnertobuildabusinesscasefor

securityplatformization.Prepareaboard-levelbriefingonoperationalbenefitsandcost

savingstogainC-suitebuy-in.Createaroadmapforscalingyoursecurityplatform.

Perspective

Whatdefinesagoodsecurityplatform?

Securityplatformscombinenumeroussolutionsintoatightlyintegrated

architecturethatmakesthewhole(theplatform)betterthanthesumofthe

parts(thecorresponding“best-of-breed”pointsolutions).Theideaofsecurityplatformizationfollowsaconsolidationlogicmanyorganizationshaveappliedtootherpartsoftheirbusiness,suchasenterpriseresourceplanning(ERP)

orcustomerrelationshipmanagement(CRM).

Ratherthanmanagingsecuritycapabilitiesindependentlyofeachother,youcanmovesecuritycapabilitiesontoacommonplatformtoensuregreatervisibility

andbettergovernanceacrosstheoperationslifecycle.Ratherthanforcing

piecemealpartstogethertomanageyoursecurityposture,youlettheplatformcarrytheburden.Identityandaccessmanagementcapabilitiesareinformedbyzerotrust,networksegmentation,andendpointdetectionandresponse(EDR)capabilities.TheAI-generatedinsightsfromyoursecurityinformationandeventmanagement(SIEM)solutionareavailabletoSOCincidentresponders.

Byreducingthenumberofapplicationintegrations,youdecreasepotential

vulnerabilitiesfrommisconfigurationsanddatamismatches.Byreducingthenumberofhandoffs,youimproveresponsetimesandincreaseaccountability.

Asyouconsiderplatforms,hereafewcharacteristicstheyshouldhave:

Theconsolidatedplatformisassecureorbetterthanthecorrespondingpointproductsyou’recurrentlyusing.Adoptingaplatformshouldnevermean

sacrificingsecurityefficacyforsimplifiedmanagementorvendorconsolidation.

Theplatformismodular.Ithastobe,toallowyourorganizationtogrowintotheplatformovertime.Youmustbeabletoadopttheplatforminwhole

orinparts,withoutlosingitsabilitytoaddresstheusecasesbeingconsidered.

Itstreamlinesintegrations.Integrationsshouldmakeeachcomponentstronger

thanitisonitsown.Alltoooften,platformsaredevelopedbybuildingasingleuserinterface(UI),butwitheachproductoperatingentirelyindependentlybeneath

thatUI.Whilethisapproachmightimprovevisibility,itfailstocapitalize

onthemoremeaningfulbenefitsfromarchitecturealintegrationandoperationalstandardization.Trueconsolidationinvolvesrethinkingtechnologysolutionsbutalsopeopleandsupportprocesses.Everythingfrompolicymanagementto

reportingmustbeconsolidatedandtightlyintegrated.

12

“Oursecurityteamhastomanagemultipleenvironments—hybridcloudandonpremises.Andwiththeplatform,forthefirsttime,itfeels

likewe’resecuringthematthesametimeandcanseereal-timewhat’shappeninginboth.We’veenhancedoverallsecurity

inanintegratedway.”

SyedFaheem

InformationTechnologyInfrastructure&OperationsManagermuviCinemas(KSA)

IT/ISintegration

Buildingabridgebetweeninformationtechnologyandinformationsecurity

Traditionally,informationtechnology(IT)andinformationsecurity(IS)

haveoperatedinseparatesiloswithdifferentprioritiesandresponsibilities.Themovetoplatformizationmakessecurityoperationsanintegralpart

ofthebroaderITestate—asmuchacontributorasaconsumer.

Ourresearchshowsthat80%oforganizationswithoutaunifiedplatformstrugglewithfragmentation.Thelackofcohesivenessforcompaniesthathavenotadoptedplatformizationcanmakethemvulnerabletopotentialthreatssimplybecausetheylackvisibilityandawareness.

Deliberate,integrateddesignmattersmorethanever

WhilethreatactorsaredeployingAIandautomationcapabilities,cyberdefenderscontinuetostrugglewithskill,capacity,andcoordinationissues.Newtacticslikemultipleextortion

campaignsmeandatabreachesandransomwarearesimplystepsinfarmoresophisticated,coordinatedattacks.

Leadersmustadoptanewperspective,whereIT,IS,andAIcapabilitiesreinforceeachother.

Withinthenexttwoyears,90%ofexecutivesexpecttobescaling,optimizing,orinnovatingwithAI.3AsecurityplatformaffordsthecommongovernanceneededtodelivertheAIcapabilities

shapingthefuture.

Ashybridcloudservicesbecomecommonplace,andAIoperationsbecomethenorm,

integrationruntimecapabilitiesacrossITandISsolutionsareessential.Threeoutoffour(75%)organizationsthathaveembracedsecurityplatformizationagreethatbetterintegrationacross

security,hybridcloud,AI,andothertechnologyplatformsiscrucial.Thisdoesn’tjustmean

integratingthetechnologiesthemselves;itinvolvesincreasedcollaborationandrethinking

operationalgovernanceforahybrid-cloud-and-AIfueledworld.Itmeansspendinglesstimethinkingofhowtoconnectsolutionarchitecturewithoperationsandmoretimethinkingaboutimprovingspeedtoinsightandoutcomeefficiency.

13

14

FIGURE5

Organizationsthatmovetoplatformscreatemoreeffective,efficientsecurityoperations

BottomquartileTopquartile

100%

75%

50%

25%

0%

.42%

.28%

.20%

.12%

.86%

.80%

.13%

.76%

Ourcurrent

Weactquickly

Wehavefullvisibility

%increasein

securityoperating

anddecisivelyto

intopotential

workloadof

modeliseffective

securityevents

vulnerabilitiesandthreats

securityoperatorinlast12months

Asecurityplatformaffordsthecommon

governanceneededtodelivertheAIcapabilities

shapingthe

future.

15

“Forus,efficiencyandagilityareimportantbecauseourteamisnotverybig.Havingalargesecuritysolutionsetmeanseachteammembermustknowmore,trainmore,earndifferentcertifications.Havingasingleplatform

makesitmucheasierforus.It’sawaytogeteverybodyonthesamepagequickly.”

JavierTorresAlonso

ChiefInformationSecurityOfficer,Allfunds

Thisiswhereintentionaldesignbecomesparamount—andthenotionof“hybrid

bydesign”comesintoplay.Hybridbydesignisastrategyforintegratingcloud

solutionswithIT/ISinfrastructure,operatingmodels,andecosystems,ensuringtechnologyalignswithbroaderbusinessgoals.4Followingahybrid-by-design

approachhelpsensuresecurityisbakedinfromthestart,alongsidecloudandAIcapabilities.Bystandardizingarchitectureandoperationalvariables,thesecurityplatformbecomesasourceofgreaterefficiencyandaccountability—justaswe’veseenwithERPandsalesplatforms.

Fromriskaversiontovaluecreation

CreatingcohesivenessbetweenITandISbeforeAIisdeployedacrossyour

organizationcanhelpavoidmultipleintegrationheadaches.AndnewtrendsareemergingthatrequireIT/ISconsolidationforsuccess.Forexample,zero-trustandnetwork-segmentationusecasesrequirethinkingthroughbothITnetworkarchitectureandsecurityaccesscontrols.

BridgingthegapbetweenITandISwithasecurityplatformcanshift

organizationalfocusfromriskaversiontovaluecreation,transformingpotentialthreatsintoopportunitiesforinnovationandgrowth.Themoreteamsembrace

theuseofcommonplatformsandservices,thelesstimetheywastegettingeveryoneonthesamepage.Andleaderscanspendlesstimenegotiating

standardsandgovernanceanddevotemoreenergytoachievinggoals.

Byremovingfragmentationandcomplexity,aconsolidatedsecurityplatformiskeytohigherperformance.

Actionguide

IntegrateIT/ISarchitectureandoperations.Createclearstandardsand

commonreferencepatternsforhybridcloud,AI,andcybersecuritywithleadersfromIT,IS,andbusinessoperations.Designandarchitectforfast-pacedAI

threats—usinghybrid-cloudcapabilitiestoaccelerateintegrationandorchestrationacrossthesecuritylifecycle.

Extendyourcapabilitiesthroughpartners.VisitacyberrangetoassesshowAIthreatsareevolving;useittosupportcontinuousimprovement,training,

andchangemanagementasyoutransformyoursecurityoperatingmodelwithplatformization.Engageapreferredmanagedsecurityservicespartner(MSSP)toaccelerateyourAItransformation.

16

Whil4eoutof

5

non-platformusersagreetheir

securityoperatorscannotdeal

effectivelywiththesheerquantityofthreatsandattacks,onlyoneinfiveplatformusersthinkthesame.

17

“Ithinkeverybodydesiresnottohave29panesofglass.It’sinefficientfromastaffing,training,andhiringperspectivebecauseI’vegotto

haveanABCexpertandanXYZexpertandsoon.SoIcanbuythesetoolspiecemealfrommultiplevendorsorIcanbuyoneplatform,

getunsurpassedintegration,andincreasemyefficiency.”

JerryCochran

DeputyChiefInformationOfficer;DivisionDirector,Cybersecurity&DigitalOpsPacificNorthwestNationalLaboratory(US)

Securitystrategyandoperations

Streamlinedsecurity

strategyandoperations

Thesecurityoperationscenter(SOC)isthebeatingheartof

cybersecurity,butonly51%oforganizationsbelievetheircurrent

securityoperatingmodeliseffective.Byreinforcingbetterways

ofworking,platformscandriveefficiencyandvisibility.Infact,98%oforganizationswithamatureapproachtoplatformizationagree

theirsecurityprocessesareefficientandclear,comparedtojust32%ofthosewithoutplatformization.

Platformizationalsoslashessecurityprocurementcostsbyeliminating

overlappingfunctionality,providinggreateraccountabilityonspendandreducingoverallmaintenancec

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論