The recent and continued acquisitions and mergers have highlighted two aspects of the current security market that I find interesting.

  • The dominant players in the cyber security industry continuing to acquire niche players to broaden their portfolio and the fact that niche companies are taking the opportunity to leverage the hype in the market.
  • The focus on intelligence and Cloud Access Security Broker (CASB) integration. Clearly organisations are struggling to determine what cloud services and applications their workforce are using and aligning this with the current threats.

If we look more closely at the first point, there is continued investment in technologies and applications for the social, mobile analytics and cloud (SMAC) world that our businesses operate in now. We still struggle to embrace the different personas of cloud, whilst the world has moved on again and the perimeter and infrastructure that we were trying to protect no longer exists. The change in the way that we access information and use our devices has now shifted the perimeter from the constrained corporate infrastructure of the past decade to the perimeter of one.

  • One device that is used for everything
  • One persona for work and pleasure
  • One connection that is constant
  • One model that is more than cloud

The second point starts to address this new perimeter of one where SMAC is today’s business model but the uncertainty here is in the threats that impact this business model. There are still continued attacks against the “traditional” infrastructure but more and more cyber criminals are leveraging social networks and weaker entry points to attack an organisation. Because of this, organisations need to have the visibility across all aspects of their business and to be able to put the risks in overall context. This is why we will continue to see the core technology vendors acquire niche security technologies and applications that provide visibility into the new business model, whilst combining this with intelligence that provides context.

For a business, it is essential to:

  • Understand its current risk exposure
  • Place current risk exposure in the context of industry best practice
  • Define the remedial activities and longer term strategic roadmap
  • Recommend prioritised solutions based on its organisational objectives

The latest acquisitions combined with a trusted solutions provider will help enable businesses to have the visibility that is essential to help prevent breaches and reduce the time and money spent recovering.