Doing More With Less

If you’re an information security professional, chances are the words “unfunded mandate” have come up more than once during your career.  Whether it’s compliance with regulations like HIPAA/HITECH and PCI, or the deployment of a new application or technology to enable the business, the available budget never seems to be enough to cover the work on the security team’s plate.

With so many priorities competing for so few resources, you’re probably asking yourself, “Where do I begin?”

Three words: Security Tool Optimization.

Most information security organizations have grown organically.  Chances are you started with a firewall, something to keep unauthorized users from accessing company resources.  Then you added antivirus, to prevent business operations from being interrupted by a virus outbreak.  Over time, you probably added an anti-spam solution, an Internet access gateway, patch management, intrusion detection, encryption, VPN, a vulnerability scanner… the list goes on and on.

Trying to maintain all those security point solutions is a nightmare.  You’re spending all of your time keeping these point solutions up and running, when your time would be better spent analyzing and addressing the specific risks that could have a significant negative impact on your business.

It’s time to take a step back and take stock of your environment, approaching the process with a fresh perspective.  Realize that your collection of security tools isn’t a burden.  It’s an opportunity.

Your company values information security enough to invest both capital funds and operating expense into deploying and maintaining security systems.  So what would happen if you combine three, four, even five of those point solutions into a single system?  You just might free up enough funds to:

  • Hire another security analyst.
  • Address a gap in your current control set by investing in a new technology.
  • Send your team to training.
  • Prove to the CIO that security isn’t a financial black hole.

Doing more with less is par for the course when it comes to information security.  Optimizing your existing information security toolset is the first step you need to take in order keep your security organization strong.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s