How Threat Intelligence Breaks Silos Created by Business Competition

By: Larry Loeb| - Leave a comment

Bigstock

The specific stops along the path of security vary drastically from one enterprise to another. Each organization requires vendors, products and solutions specific to its own needs. And the intense business competition between providers doesn’t exactly help make the ride smoother.

This disparate landscape has given rise to skirmishes between security vendors. Due to variations between products, each vendor often exalts its solution as the one that will best meet customers’ needs. But the security field has grown so wide in recent years that no one vendor can reasonably make the claim that they provide the magic bullet that will solve all problems. In security, one size doesn’t fit all.

Threat Intelligence Offers a Solution

Security vendors are coming to realize that in order to ensure their products can detect as many threats as possible, they must engage in focused, mutual cooperation. Fortunately, threat intelligence can provide in-depth knowledge of threats, allowing organizations to prepare for whatever comes their way. In the past, organizations like the Cyber Threat Alliance, the Global Cyber Alliance and the Threat Prevention Alliance have all been successful in cooperative threat intelligence.

Cooperative threat intelligence has been strongly advocated by the U.S. and U.K. governments as a best practice in security. This has no doubt given it a boost in mainstream adoption by these two countries, especially in criminal cases.

Identifying relevant data is crucial to designing an effective security strategy. According to CSO, mature threat intelligence requires companies to effectively parse irrelevant information from high-value data to better drive threat mitigation. The more an enterprise is aware of the context of its data, the less likely it is to fall victim to high-volatility situations.

Addressing Silos Within Business Competition

One area that still remains a nagging problem is getting security solutions to interoperate successfully. Each vendor is wrapped up inside a silo of information generated by its own product and may not appreciate that users really need all their tools to be able to share information.

To break the silo wall, vendors should develop API integration that allows each product to send information to another security application. This would allow the product to communicate the services it offers. Vendors might not wish to go this route, as it opens the door for their own customers to simultaneously use competing products. But eventually, they may have no choice: User demand may simply propel this change into action.

Enterprise security has become too complex for one vendor to handle on its own. Solution providers must alter how security products act together for the benefit of the user — or risk losing the user altogether.

Topics: , ,

Comments