




版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
IBMInstituteforBusinessValue|ResearchInsights
Capturingthecybersecuritydividend
Howsecurityplatformsgeneratebusinessvalue
palog'
HowIBMandPaloAltoNetworkscanhelp
IBMConsultingandPaloAltoNetworkshavejoinedforces
todeliverAI-powered,fullyintegrated,open,end-to-endsecurity
solutionstoenterprises.Fromconsultationthroughexecution,
wecanhelpyoumodernizeyourcybersecurityprogram,savingtime,money,andresourcesaswellasenhancingyourorganization’s
resilienceagainsttoday’scomplexthreats.Formoreinformation,visit
/consulting/palo-alto
.
ForewordOrganizationsaroundtheglobearefacingapivotalmoment
insecurity—onethatrequiresurgentaction.
Digitalconnectivityexpandsattacksurfacesandcreatesnewvulnerabilities.Cyberattacks
arebecomingmoresophisticatedandhardertodefendagainst.AndAIisbeingusedbybothdefendersandattackers,creatingaraceincybersecuritycapabilities.
Cybersecuritytoolsandsolutionsabound,mostpromisingsomesortofseachange.Inrealitythough,manydeliveronlyarippleor,atbest,apassingwave.Why?Complexityisgettinginthewayofresults.
Thecybersecuritylandscapehasalwaysbeenacomplexwebofthreatsandcountermeasures.
Buttheproliferationofthreatsandthemind-bogglingnumberofpotentialresponsestodayisenoughtorobaChiefInformationSecurityOfficerorChiefTechnologyOfficerofsome
much-neededsleep.Organizationsjuggleanaverageof83differentsecuritysolutionsfrom29vendors.It’sunnecessaryconvolutionandrisk.Moretoolsequalmorethreats;every
integrationisapotentialpointofentryforbadactors.
Intoday’sworld,effectivesecurityrequiresplatformization.Platformizedorganizations
take72daysless,onaverage,todetectasecurityincidentand84dayslesstocontainone.Consolidatingmultipletoolsintoaunifiedplatformnotonlybolsterssecurityposture,italsoreducescostsandimprovesoperationalefficiency—twothingsanyC-suiteexecutiveor
businessleaderwillwelcome.AndwhenitcomestoAI,aplatformapproachbestenablesanorganizationtoingestandanalyzedata,andthendeliveractionableinsights.
Ourrolesgiveusanopportunitytoengagewithorganizationsfromeveryindustryand
geography,providingusaviewfromthesecuritymountaintop—andweseethatwaiting
isariskygame.Thisisn’tjustaboutfuture-proofing,it’saboutsafeguardingthepresent.
Imaginesecuritytoolsthatharmonizeseamlessly,sharingintelligenceandautomating
responsesatanunprecedentedspeed.ThisvisionisalreadyarealityformanyorganizationsthathaveplatformizedtheirsecuritysincePaloAltoNetworksintroducedtheconcept
oneyearago.
Securityplatformsofferunparalleledvisibility,strengtheneddefenses,improvedcosts,
andefficiency—allleadingtotangiblebusinessbenefits.Arobust,integratedsecurityplatformcanbetheshieldthatprotectsyourorganization’sreputation,customertrust,andbottomline.
Intoday’sAI-fueledworld,strongpartnershipsaremoreessentialthanever.Thestrategic
partnershipbetweenIBMandPaloAltoNetworksbringstogetherleadingsecurityplatform,
AI,andtransformationcapabilities.Collaboratingonthisreport,wehaveidentifiedwhatittakestosuccessfullypivottosecurityplatformizationandwhatitcandeliverforyourorganization.
Together,weareuniqueinourabilitytohelpyouembracethisopportunityandbethebestpartnersforyou.
MohamadAli
SeniorVicePresidentandHeadIBMConsulting
BJJenkinsPresident
PaloAltoNetworks
1
2
Key
takeaways
52%ofexecutivessay
complexityisthebiggestimpedimenttotheir
cybersecurityoperations.
Securityfragmentationisnowtheunhappynorm.
Theaverageorganizationhas83differentsecurity
solutionsfrom29vendors.Amajority,52%,ofexecutivessaycomplexityisthebiggestimpedimenttosecurityoperations.
SecurityplatformsbringfasterresponsetimesandhigherROI.
Platformizedorganizationstake72daysless,on
average,todetectasecurityincident,and84days
lesstocontainone.TheyalsoreapanaverageROI
of101%,comparedto28%forthosethatarenotyetembracingplatformization.
Platformizationmovesthesecurityfunctionfrom“necessarycost”
tovaluegenerator.
96%ofexecutivesinoursurveywhohaveadoptedplatformizationsaysecurityisasourceofvalue,
comparedtojust8%ofthosewhohaven’t.
Theaveragecostofsecuritycomplexityismorethan
5%
ofannualrevenue.
Cybersecurityshouldboostthebottomline
Asthedigitallandscapecontinuestochange,organizationsfaceadauntingreality:cybersecuritycomplexityiseatingawayattheirbottomline.
Infact,cybersecurityismoreexpensivethanever.Theaverage
costofadatabreachrose10%in2024,toanall-timehighof$4.88million.1Andwhenagrowingthreatlandscapeisaddressedwith
moresecuritysolutions,anorganization’soverallsecuritycostsrisesignificantly,withcybersecurityspendingexpectedtogrowmore
than50%from2023to2025.Meanwhile,80%ofexecutivesagreetheyfacepressuretoreducethecostofsecurity.
Theillusionof“moresolutions,moresecurity”
Manyorganizationshavecontinuedtoaddtotheirstableofsecuritysolutions,hopingtoplugholesastheybecomeapparentandas
threatsincrease.Butourresearchshowsthisapproachisnotapathtosuccess—instead,itaddscomplexityandinefficiency.There’s
alimittohowfaryoucangetbyaddingmoresecuritysolutions.
Thatstrategygraduallydilutesthebenefitsofeachnewsolutionandultimatelyreducessecurityeffectiveness(seeFigure1).
Sowhatisthesolution?Whereisthereopportunity,whatmodels
exist,andwhatlessonscantheyteach?Toexplorethesequestions,theIBMInstituteforBusinessValue(IBV)partneredwithPaloAltoNetworkstosurvey1,000executivesinvolvedinsecurityacross
21industriesand18countries.Theresultsprovidedsomeclearopportunitiesandactionablelessons.
Tellingly,52%ofexecutivessaycomplexityisthebiggestimpedimenttotheircybersecurityoperations.Whenaskedtoestimatethetotal
impactofsecuritycomplexitytotheirbusiness,responsesfrom
C-suiteexecutivesonthesecurityfrontlinewerestartling.Basedon
“Cybersecurityis
theirresponses,theaveragecostofsecuritycomplexityismorethan
apermanentrace.”2
5%ofannualrevenue.Foracompanywith$20billioninannual
HanukStars
revenue,that’sa$1-billionannualcosttothebusinessresultingfrom
Memberoftheboard,IT&Data
securityincidents,inefficiencies,faileddigitaltransformationefforts,
VolkswagenAG
stalledAIinitiatives,lossofcustomertrust,andreputationaldamage.
3
4
FIGURE1
Platformsbringfewerpointsolutions,moreeffectivesecurityoverall
Security
100%
50%
effectiveness
With
platformization
Riskgap
Risksremaindueto
spend,capacity,and
complexityconstraints
Without
platformization
050100
Numberofsecuritysolutions
Thesecuritybusinesschallengefacingmanyleaders:
Securitycomplexity
Asthenumberofsecurity
Thisresultsinadynamic
directlyimpactsbusiness
solutionsproliferates,more
wherecomplexityfeedsitself
factorslikeROI.
spendisrequiredtoachievefeweroutcomes.
andleaderscanneverspend“enough”oncybersecurity.
5
Anantidotetothecostsofsecuritycomplexity
Byaddressingcomplexity—strategicallyconsolidatingandintegratingsecurity
solutionsontoacommonplatform—organizationscandramaticallylowertheirrisk
posture,reducetheircosts,andunlockimprovedbusinessopportunities.Wecallthissecurityplatformization—andourresearchshowsadistinctconnectionbetween
platformizationandpositivebusinessandsecurityoutcomes(seeFigure2).
FIGURE2
Platformusersgainpracticalbenefits
atalllevels
280%
morelikelytohaveaddresseddigital
transformationlimitationsfromfragmentation
Digital
transformation
IT/ISIntegration
Nearly
3X
morelikelytohaveaddressedIT/ISintegrationlimitations
fromfragmentation
275%
morelikelytohaveaddressedsecuritytransformation
limitationsfromfragmentation
SOCoperators
Almost
3X
morelikelytouseAIand
automationtorelievepressureonsecurityanalysts
Securitystrategy&operations
70%
lesslikelytoreportworkloadincreasesfromfragmentation
There’sabetterwaytoapproachsecurity
Thisreportoutlineshowashiftinstrategicapproachtosecurity
platformizationcangeneratebenefits,plusdelvesintothesignificantimpactsplatformizationcanhaveonAIinitiatives.Inaddition,we’ll
offeraguidetorealizetheseimprovements.
Currentsecurity
approachesarenotapathtosuccess
80%
ofexecutivesagreetheyfacepressuretoreducethecostof
securityevenasnewthreatsemerge.
74%
ofexecutivesagreethat
thecurrentworkloadontheir
securityoperatorsisexcessive.
52%
ofexecutivesagreethat
fragmentationoftheirsecuritysolutionsislimitingtheirabilitytodealwiththreats.
6
7
Perspective
Howweanalyzedtheimpactofsecurityplatforms
Toassesstheroleofsecurityplatformizationinoverallsecurityandbusinessperformance,weanalyzedthe1,000organizationsinoursurveyset.Wedevelopedanindexofsecurityplatformizationbasedonfourkeycriteria:
–Simplification.Howgreataroledoesconsolidationplayinsecuritystrategy?
–Portfoliorationalization.Howconsolidatedaresecuritytoolsandtechnologies?
–Proactivehousekeeping.Howwellandregularlyareoutdatedsecuritysolutionsidentifiedandremoved?
–Platformingprogress.Towhatextentaresecurityplatformsadopted?
Foreachcriterion,executivesansweredascaledquestionassessingtheirprogress.Theplatformizationindexwascreatedasasimpleaverageoftheirscoresoneach
ofthefour.
Throughoutthisreport,weillustratetherelationshipbetweenplatformizationindexscoresandperformanceviascatterdiagramsorbysegmentingthe1,000executivesintoquartilesbasedontheirindexscores.Thetopquartilereferstotheorganizationswiththehighest
platformizationindexscores,whilethebottomquartileconsistsoftheorganizationswith
thelowestplatformizationindexscores.Butit’snotwhereorganizationssitontheindexthatisthenuggetofgoldinthisresearch—rather,it’stherelationshipbetweenplatformization
andvariouspositiveoutcomes.
Keytakeaways
fromtheanalysis
Ouranalysisrevealsastrongcorrelationbetweentheplatformizationindexandkeysecurityperformancemetrics.Organizationswithhigherplatformizationscoresdemonstrate:
–Fasterincidentresponse.Platformizedorganizationstake72daysless,onaverage,todetectasecurityincident,and84dayslesstocontainone.
–ImprovedROI.AnaverageROIof101%comparedto28%forthosethatarenotyetembracingplatformization.Platformizationexplains48%
ofthevariationinROI.
–Enhancedreturnonsecurityinvestment(ROSI).AnaverageROSI
of116%comparedto32%forthosethatarenotyetembracing
platformization.Platformizationexplains49%ofthevariationinROSI.
Inshort,thedataindicatessecurityplatformizationhelpsdriveimprovedperformanceandoptimizesthevalueofsecurityinvestments.
Platformizedorganizationstake
72
84
daysless,onaverage,todetect
asecurityincident,anddayslesstocontainone.
8
“Whenwedidallthemath,weactuallyknockedourcostdownbyseveral
hundredthousanddollarsperyear.Ifyoulookedatallthecomponentsthat
wereincluded,wewereabletosayit’snotonlydowegetmore,butwepayless.”
JerryCochran
DeputyChiefInformationOfficer;DivisionDirector,Cybersecurity&DigitalOpsPacificNorthwestNationalLaboratory(US)
9
“Oneofthemainbenefitsofthesecurityplatformisthatourproviderhasaroadmap.Wecanalignourstrategytocapitalizeonthat.
Wegainefficienciesbecauseoursecuritypartnerisshowingushowthesolutionwillevolve.Theyaremakingtheinvestmentsnecessarytodeveloptheplatformandintegratethedifferentcapabilities.”
JavierTorresAlonso
ChiefInformationSecurityOfficer,Allfunds
Digitaltransformation
Digitaltransformationandplatforms:Abusinessperformanceboost
Rethinkingrisk
Thinkaboutalargeconstructionprojectwithmultiplecontractors,eachusing
theirowntools,materials,andblueprints.Whileeachcontractormightbeskilled,coordinatingtheireffortswithoutaunifiedplanandsharedresourcescanlead
todelays,inefficiencies,andpotentialsafetyhazards.
Thecurrentstateofcybersecurityissimilar.Organizations
haveaccumulatedsecurityproductsandservicesovertimeonatool-by-toolbasis.Eachhasitsowndashboards,datamodels,
trainingneeds,andmore.Ourresearchshowsthatenterprisesjuggle
anaverageof83differentsecuritysolutionsfrom29vendors,creatingatangled,expansivemessthatfrustratessecurity
professionalsandhindersoveralleffectiveness.
Securityplatformizationistheequivalentofunifyingtheconstructionunderasinglegeneralcontractor,withstandardizedequipmentandprocedures.Platformizationeliminatesunnecessaryrepetitionof
work,simplifiesoperations,andempowerssecurityteamstofocusonstrategicinitiatives.
Thebenefitsarecompelling.Organizationsinourstudythathave
madestridestowardplatformizationreportsubstantiallyfewer
incidentsanddatabreaches.Theirmeantimetoidentify(MTTI)ordetectsecurityincidentsis72daysshorter,whilemeantimeto
contain(MTTC)—thetimeittakestoresolveanincident—is84daysless.Also,80%ofplatformizationadoptersinourresearchsaytheyhavefullvisibilityintopotentialvulnerabilitiesandthreats,versus
only28%ofnon-adopters.
Ourresearchshows
thatenterprisesjuggleanaverageof
differentsecuritysolutionsfrom
83
vendors.
29
FIGURE3
10
Organizationswiththegreatestsecurityplatformmaturityarefastertoidentifyandcontain
securityincidents
Meantimeto
identify(MTTI)
250
200
150
100
50
0
-2.00-1.000.001.002.00
Platformizationindexscore
Meantimeto
contain(MTTC)
250
200
150
100
50
0
-2.00-1.000.001.002.00
Platformizationindexscore
11
FIGURE4
Platformizedorganizationsseegreaterbusinessimpactfromtheircybersecurityinvestments
%ofrespondentsindicatingtheircybersecurityinvestmentshavegeneratedsigni?cant
improvementsinrevenuegeneration
Bottomquartile
Secondquartile
Third
quartile
Top
quartile
73%
2%
6%
27%
Revenuegenerationandefficiency
Securityplatformizationcanfurtherbusiness
goals.Infact,inourresearch,sevenoutof10
organizationswithahighdegreeofplatformizationreportthatcybersecurityinvestmentshavehelpedrevenuegenerationandoperationalefficiencies.
Only2%ofexecutivesfromorganizationsthathaveyettomovetowardplatformizationsaythesame.
Thisadvantagecomesinpartfromenhancedagility.Manydigitaltransformationeffortscanbederailedbysecurityconcerns.Yetamongplatformusers,
only10%ofdigitaltransformationinitiativesfailtoscaleduetosecurityconcerns,comparedto26%fornon-platformusers.
What’smore,platformizationaidsinnovationinitiatives.Toooften,inthenormalcourseof
business,cybersecurityisrelegatedtotherole
ofgatekeeper—alastlineofdefensethatslows
downresponsivenessanddetersexperimentation.
Incontrast,organizationsinourstudythatuseintegratedsecurityplatformshavegreater
visibility,control,andaccesstoautomation.
Thathelpstransformsecurityfromacostcentertoavaluedriver.
Infact,96%ofexecutivesinoursurveywhohaveadoptedplatformizationsaysecurityisasourceofvalue,comparedtojust8%ofthosewhohaven’t.
%ofrespondentsindicatingtheircybersecurityinvestmentshavegeneratedsigni?cant
improvementsinoperationalef?ciencies
Bottomquartile
1%
Secondquartile
2%
Third
quartile
19%
Top
quartile
68%
7outof10
organizationswithahighdegreeof
platformizationreportthatcybersecurity
investmentshavehelpedrevenuegenerationandoperationalefficiencies.
Only2%
ofnon-platformizedorganizationsreportthesame.
Actionguide
Rationalizeyoursecuritytoolset.Establish
aworkinggroupwithyoursecurity,technology,andbusinessleaderstoevaluatetheimpact
ofsecuritycomplexityonkeyperformancemetrics.Conductacomprehensivesecuritytoolsetassessment,includingacost-benefitanalysisofeachtool.Identifyredundancy,
gaps,andopportunitiesforconsolidationorreplacement.
Pivottoaplatform-firstapproach.Engagetherightpartnertobuildabusinesscasefor
securityplatformization.Prepareaboard-levelbriefingonoperationalbenefitsandcost
savingstogainC-suitebuy-in.Createaroadmapforscalingyoursecurityplatform.
Perspective
Whatdefinesagoodsecurityplatform?
Securityplatformscombinenumeroussolutionsintoatightlyintegrated
architecturethatmakesthewhole(theplatform)betterthanthesumofthe
parts(thecorresponding“best-of-breed”pointsolutions).Theideaofsecurityplatformizationfollowsaconsolidationlogicmanyorganizationshaveappliedtootherpartsoftheirbusiness,suchasenterpriseresourceplanning(ERP)
orcustomerrelationshipmanagement(CRM).
Ratherthanmanagingsecuritycapabilitiesindependentlyofeachother,youcanmovesecuritycapabilitiesontoacommonplatformtoensuregreatervisibility
andbettergovernanceacrosstheoperationslifecycle.Ratherthanforcing
piecemealpartstogethertomanageyoursecurityposture,youlettheplatformcarrytheburden.Identityandaccessmanagementcapabilitiesareinformedbyzerotrust,networksegmentation,andendpointdetectionandresponse(EDR)capabilities.TheAI-generatedinsightsfromyoursecurityinformationandeventmanagement(SIEM)solutionareavailabletoSOCincidentresponders.
Byreducingthenumberofapplicationintegrations,youdecreasepotential
vulnerabilitiesfrommisconfigurationsanddatamismatches.Byreducingthenumberofhandoffs,youimproveresponsetimesandincreaseaccountability.
Asyouconsiderplatforms,hereafewcharacteristicstheyshouldhave:
Theconsolidatedplatformisassecureorbetterthanthecorrespondingpointproductsyou’recurrentlyusing.Adoptingaplatformshouldnevermean
sacrificingsecurityefficacyforsimplifiedmanagementorvendorconsolidation.
Theplatformismodular.Ithastobe,toallowyourorganizationtogrowintotheplatformovertime.Youmustbeabletoadopttheplatforminwhole
orinparts,withoutlosingitsabilitytoaddresstheusecasesbeingconsidered.
Itstreamlinesintegrations.Integrationsshouldmakeeachcomponentstronger
thanitisonitsown.Alltoooften,platformsaredevelopedbybuildingasingleuserinterface(UI),butwitheachproductoperatingentirelyindependentlybeneath
thatUI.Whilethisapproachmightimprovevisibility,itfailstocapitalize
onthemoremeaningfulbenefitsfromarchitecturealintegrationandoperationalstandardization.Trueconsolidationinvolvesrethinkingtechnologysolutionsbutalsopeopleandsupportprocesses.Everythingfrompolicymanagementto
reportingmustbeconsolidatedandtightlyintegrated.
12
“Oursecurityteamhastomanagemultipleenvironments—hybridcloudandonpremises.Andwiththeplatform,forthefirsttime,itfeels
likewe’resecuringthematthesametimeandcanseereal-timewhat’shappeninginboth.We’veenhancedoverallsecurity
inanintegratedway.”
SyedFaheem
InformationTechnologyInfrastructure&OperationsManagermuviCinemas(KSA)
IT/ISintegration
Buildingabridgebetweeninformationtechnologyandinformationsecurity
Traditionally,informationtechnology(IT)andinformationsecurity(IS)
haveoperatedinseparatesiloswithdifferentprioritiesandresponsibilities.Themovetoplatformizationmakessecurityoperationsanintegralpart
ofthebroaderITestate—asmuchacontributorasaconsumer.
Ourresearchshowsthat80%oforganizationswithoutaunifiedplatformstrugglewithfragmentation.Thelackofcohesivenessforcompaniesthathavenotadoptedplatformizationcanmakethemvulnerabletopotentialthreatssimplybecausetheylackvisibilityandawareness.
Deliberate,integrateddesignmattersmorethanever
WhilethreatactorsaredeployingAIandautomationcapabilities,cyberdefenderscontinuetostrugglewithskill,capacity,andcoordinationissues.Newtacticslikemultipleextortion
campaignsmeandatabreachesandransomwarearesimplystepsinfarmoresophisticated,coordinatedattacks.
Leadersmustadoptanewperspective,whereIT,IS,andAIcapabilitiesreinforceeachother.
Withinthenexttwoyears,90%ofexecutivesexpecttobescaling,optimizing,orinnovatingwithAI.3AsecurityplatformaffordsthecommongovernanceneededtodelivertheAIcapabilities
shapingthefuture.
Ashybridcloudservicesbecomecommonplace,andAIoperationsbecomethenorm,
integrationruntimecapabilitiesacrossITandISsolutionsareessential.Threeoutoffour(75%)organizationsthathaveembracedsecurityplatformizationagreethatbetterintegrationacross
security,hybridcloud,AI,andothertechnologyplatformsiscrucial.Thisdoesn’tjustmean
integratingthetechnologiesthemselves;itinvolvesincreasedcollaborationandrethinking
operationalgovernanceforahybrid-cloud-and-AIfueledworld.Itmeansspendinglesstimethinkingofhowtoconnectsolutionarchitecturewithoperationsandmoretimethinkingaboutimprovingspeedtoinsightandoutcomeefficiency.
13
14
FIGURE5
Organizationsthatmovetoplatformscreatemoreeffective,efficientsecurityoperations
BottomquartileTopquartile
100%
75%
50%
25%
0%
.42%
.28%
.20%
.12%
.86%
.80%
.13%
.76%
Ourcurrent
Weactquickly
Wehavefullvisibility
%increasein
securityoperating
anddecisivelyto
intopotential
workloadof
modeliseffective
securityevents
vulnerabilitiesandthreats
securityoperatorinlast12months
Asecurityplatformaffordsthecommon
governanceneededtodelivertheAIcapabilities
shapingthe
future.
15
“Forus,efficiencyandagilityareimportantbecauseourteamisnotverybig.Havingalargesecuritysolutionsetmeanseachteammembermustknowmore,trainmore,earndifferentcertifications.Havingasingleplatform
makesitmucheasierforus.It’sawaytogeteverybodyonthesamepagequickly.”
JavierTorresAlonso
ChiefInformationSecurityOfficer,Allfunds
Thisiswhereintentionaldesignbecomesparamount—andthenotionof“hybrid
bydesign”comesintoplay.Hybridbydesignisastrategyforintegratingcloud
solutionswithIT/ISinfrastructure,operatingmodels,andecosystems,ensuringtechnologyalignswithbroaderbusinessgoals.4Followingahybrid-by-design
approachhelpsensuresecurityisbakedinfromthestart,alongsidecloudandAIcapabilities.Bystandardizingarchitectureandoperationalvariables,thesecurityplatformbecomesasourceofgreaterefficiencyandaccountability—justaswe’veseenwithERPandsalesplatforms.
Fromriskaversiontovaluecreation
CreatingcohesivenessbetweenITandISbeforeAIisdeployedacrossyour
organizationcanhelpavoidmultipleintegrationheadaches.AndnewtrendsareemergingthatrequireIT/ISconsolidationforsuccess.Forexample,zero-trustandnetwork-segmentationusecasesrequirethinkingthroughbothITnetworkarchitectureandsecurityaccesscontrols.
BridgingthegapbetweenITandISwithasecurityplatformcanshift
organizationalfocusfromriskaversiontovaluecreation,transformingpotentialthreatsintoopportunitiesforinnovationandgrowth.Themoreteamsembrace
theuseofcommonplatformsandservices,thelesstimetheywastegettingeveryoneonthesamepage.Andleaderscanspendlesstimenegotiating
standardsandgovernanceanddevotemoreenergytoachievinggoals.
Byremovingfragmentationandcomplexity,aconsolidatedsecurityplatformiskeytohigherperformance.
Actionguide
IntegrateIT/ISarchitectureandoperations.Createclearstandardsand
commonreferencepatternsforhybridcloud,AI,andcybersecuritywithleadersfromIT,IS,andbusinessoperations.Designandarchitectforfast-pacedAI
threats—usinghybrid-cloudcapabilitiestoaccelerateintegrationandorchestrationacrossthesecuritylifecycle.
Extendyourcapabilitiesthroughpartners.VisitacyberrangetoassesshowAIthreatsareevolving;useittosupportcontinuousimprovement,training,
andchangemanagementasyoutransformyoursecurityoperatingmodelwithplatformization.Engageapreferredmanagedsecurityservicespartner(MSSP)toaccelerateyourAItransformation.
16
Whil4eoutof
5
non-platformusersagreetheir
securityoperatorscannotdeal
effectivelywiththesheerquantityofthreatsandattacks,onlyoneinfiveplatformusersthinkthesame.
17
“Ithinkeverybodydesiresnottohave29panesofglass.It’sinefficientfromastaffing,training,andhiringperspectivebecauseI’vegotto
haveanABCexpertandanXYZexpertandsoon.SoIcanbuythesetoolspiecemealfrommultiplevendorsorIcanbuyoneplatform,
getunsurpassedintegration,andincreasemyefficiency.”
JerryCochran
DeputyChiefInformationOfficer;DivisionDirector,Cybersecurity&DigitalOpsPacificNorthwestNationalLaboratory(US)
Securitystrategyandoperations
Streamlinedsecurity
strategyandoperations
Thesecurityoperationscenter(SOC)isthebeatingheartof
cybersecurity,butonly51%oforganizationsbelievetheircurrent
securityoperatingmodeliseffective.Byreinforcingbetterways
ofworking,platformscandriveefficiencyandvisibility.Infact,98%oforganizationswithamatureapproachtoplatformizationagree
theirsecurityprocessesareefficientandclear,comparedtojust32%ofthosewithoutplatformization.
Platformizationalsoslashessecurityprocurementcostsbyeliminating
overlappingfunctionality,providinggreateraccountabilityonspendandreducingoverallmaintenancec
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 三農(nóng)信息人才培養(yǎng)計劃及實施方案
- 多領域融合的智能科技項目開發(fā)協(xié)議
- 工程項目居間的合同
- 化工廠員工勞動協(xié)議
- 經(jīng)營承包合同
- 勞務輸出合作協(xié)議書
- 第2課 獎品數(shù)量好計算(教學設計)2024-2025學年五年級上冊信息技術泰山版
- 新媒體主播合約協(xié)議書8篇
- Unit 8 Knowing the world Lesson 2 My home country 教學設計 2024-2025學年冀教版英語七年級上冊
- 甘肅幼兒園塑膠施工方案
- 2025年春季學期學校德育工作計劃及安排表
- 中華人民共和國學前教育法
- 手術患者知情同意制度培訓
- 第一課 追求向上向善的道德(課時1)(課件)
- 2024年新蘇教版六年級下冊科學全冊精編課件
- NB-T 47013.1-2015 承壓設備無損檢測 第1部分-通用要求
- 新人教版高中數(shù)學必修第二冊全冊教案
- GB/T 13912-2020金屬覆蓋層鋼鐵制件熱浸鍍鋅層技術要求及試驗方法
- GB∕T 8163-2018 輸送流體用無縫鋼管
- 短視頻:策劃制作與運營課件
- 水閘設計步驟計算書(多表)
評論
0/150
提交評論