Tool Sprawl May Be Hindering Your Security Efforts

Tool Sprawl May Be Hindering Your Security Efforts

In his 2004 book “The Paradox of Choice: Why More is Less,” psychologist Barry Schwartz suggests that an overabundance of choice contributes to anxiety, dissatisfaction and regret by setting us up for unrealistic expectations. With so many choices, he theorizes, we will invariably second-guess any selection we make.

Recent research suggests cybersecurity professionals are experiencing a similar phenomenon. In a recent survey by LogRhythm, more than 90 percent of security professionals said they lack the tools they need to detect known threats and close security gaps. However, 68 percent also admitted their organization has deployed redundant security tools, with most suggesting this overlap results from poor strategic oversight.

Too Much of a Good Thing

A more recent study from IDG produces similar findings, suggesting that continued investments in security tools are not producing the expected results. Tool sprawl, combined with strategic misalignments and a lack of meaningful metrics, may be compromising security.

In its survey of 400 IT and security decision-makers, IDG found that enterprises maintain, on average, 19 different security tools. Nearly a third have between 30 and 100 separate tools. However, respondents say fewer than a quarter of those tools are serving primary security objectives.

Additional findings include:

  • · Only 47 percent of existing tools are used daily.
  • · 71 percent of respondents agreed that most existing tools are underutilized.
  • · 85 percent say they are adding technologies faster than they can productively use them.
  • · 71 percent say the increasing amount of time they spend managing tools inhibits their ability to defend against threats.
  • · 62 percent say their companies have deployed more security tools than they need.
  • · 78 percent say the number of security technologies in use is increasing risk.
  • · 66 percent say they are unable to integrate their existing security tools.
  • · Nonetheless, 87 percent expect the number of security tools to increase in the next 12 months.

The study says companies often buy new security tools, each addressing a different security challenge, without a clear understanding of what their security teams really need. If these tools aren’t properly implemented, configured or integrated, they don’t produce the expected results. When that happens, they are usually replaced or otherwise eliminated. On average, enterprises activate six tools while deactivating seven in a typical 12-month period, according to the study.

The ongoing security skills gap only complicates efforts to manage these tools. According to the Information Systems Security Association (ISSA), 70 percent of security professionals say their organizations have experienced negative impacts due to a lack of in-house cybersecurity skills and knowledge. Nearly half say the skills gap has gotten worse over the past few years.

Untitled design - 2022-09-26T113720.133.png

A Helping Hand

Such challenges, and the lack of in-house expertise to deal with them, are leading more organizations to partner with security specialists to address their needs. DeSeMa’s experienced consultants can conduct a thorough assessment of your existing tools and their capabilities to identify duplicate solutions, misconfigurations and unused tools. That information can be used to consolidate tools to reduce tool sprawl.

Additionally, DeSeMa can find the holes in your security and develop a comprehensive strategy. Our team can map security coverage across specific use cases to eliminate gaps and overlaps, and leverage application-specific connectors to integrate tools to improve coverage. We can also help you consolidate security alerts from firewalls, intrusion prevention systems, endpoint security tools and other systems, and automate many tasks to streamline administration and improve threat response.

Tool sprawl not only increases costs and management burdens — it can compromise your security efforts. Contact us to learn how we can help you simplify your solution stack and enhance your overall security posture.

Get Started Today!