Security fragmentation needs to end

A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted.

More on network security problems: 10 of the Worst Moments in Network Security History

The stark reality is that security breaches can, will and do happen to everyone. For every security control and process we put in place, somewhere else there's a vulnerability, a weakness, an untrained employee or a path of least resistance for an attack. All the point solutions in the world are not going to make us any more secure. What we desperately need is a new model for integrating security solutions across vendors, across devices, across operating systems and across the globe.

Companies today are faced with a fundamental security conundrum. Their networks, applications and end-user devices are made up of a patchwork of dozens if not hundreds of vendor solutions. Each vendor may offer security features in their apps, security appliances, or even an entire range of security solutions. None of them really interoperate with any of the other vendors' security solutions (not unless you consider LDAP and syslog to be interoperability). None of them work on other vendor network devices. In most cases, security solutions from the same vendor don't even coordinate among themselves. As a result, companies are left with no choice but to try and patch security fragments together and hope nothing slips through the cracks.

To add insult to injury, the vendors continue to unveil the latest and greatest security "vision", pretending the entire world is made up of single vendor deployments, just like their lab. Startups rush in to fill the gaps, re-inventing the wheel for each aspect of their product - building a policy engine, a reporting engine, a set of compliance reports, directory integration and logging - all proprietary, closed and insular. Entire security "sectors" ramp up overnight to address a single new type of attack, creating new categories and solutions so narrowly focused they don't deserve to be features, let alone products or even industry sectors. The larger vendors acquire, re-engineer, absorb and half-integrate the solutions, about two to three years too late to catch up with the bad guys. Rinse and repeat.

Well, it's not working. Consider how much money is spent every year on information security and then look at how easily these attacks seem to be. The victims of security breaches are not just the Internet newbies and rubes, but some of the most sophisticated companies in the world. They suffer breaches despite spending enormous amounts of money, effort and attention on security.

The bottom line is that customers have all the power. Stop buying fragmented security point-solutions and magic bullets. Stop buying proprietary systems. Stop buying "end-to-end" security where both ends (and everything in between) have to be from the same vendor. Challenge insular vendors. Demand open standards and open protocols with support from multiple vendors, or take your money elsewhere. The security industry is broken and only customers can fix it.

Read more about wide area network in Network World's Wide Area Network section.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cybercrimelegaldata breachanti-malware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andreas M. Antonopoulos

Network World
Show Comments

Father’s Day Gift Guide

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?