Cygilant Blog

Technology: 1/3 of the Battle

Posted by Mike Leonard on Feb 12, 2018

3 Legged Stool.jpgI spent the first few years of my career as a financial advisor and hated every day.  It was boring, slow paced, and confusing to customers.  Two words to describe asking grandma about her annuity over every holiday dinner: not fun.  So in 2012, I joined the fast-paced, ever-changing world of cybersecurity.  Over the past six years, I have held a number of sales roles, both in leadership and as an individual contributor.  I have found it – thankfully – to be the exact opposite of the finance world… except when it comes to the confusion in the market.

Since joining the industry, I’ve had the good fortune to work for industry leaders within both the next-generation Endpoint and Firewall space.  The tech delivered by both of my previous organizations were as solid as they were cutting edge.  As a result, they and technologies like them have experienced wide spread adoption rates over the past few years.  And this is a very good thing for the security industry as a whole, as many traditional solutions no longer hold up in today’s world.

However, despite the growing adoption rates of next-gen solutions, there were still more breaches in 2017 than there were in 2016.  I’d be willing to bet my brand new Apple AirPods that there will be more breaches in 2018 than there were in 2017.  The statistics tell us two things:  1) the bad guys are winning, and 2) technology alone isn’t enough.

If technology itself could solve the problems presented in today’s advanced cyber security landscape, it would have already.  The bottom line is that tech represents just 1/3 of the three legged stool that is an effective security program.  Organizations need to marry best-in-breed technology solutions with experienced people and efficient processes in order to win the battle.  The challenge here is that virtually every IT/Security team I speak with is overburdened and underfunded, making it virtually impossible to stand up the Technology, People, and Processes required to avoid security incidents. 

This isn’t meant to say that best-in-breed solutions are a waste of time or money.  We encourage each of our customers to do their due diligence across the entire security stack and make the best decisions and investments possible.  But this comes with a few caveats to bear in mind – standalone technologies tend to be difficult to manage, are expensive, and create information silos.  As a result, constructing a 24x7 security program becomes nearly impossible, particularly in the mid and small market space.

At Cygilant, we believe that every organization, regardless of size, deserves an enterprise-class cybersecurity program at an affordable cost.  We deliver to our customers all three of the components central to an effective security program:

  • Technology: SOCVue, our own battle-tested security platform that delivers log monitoring, vulnerability management, and patch management
  • People: 24x7 Global SOC team with a dedicated Service Delivery Manager
  • Processes: Advanced threat intel, daily security insights, monthly reporting, and security consultation/incident investigation

If you’d like to learn more about how SOCVue from Cygilant can help your organization build a with a 24x7 security program, learn more at:

Curious How SOCVue Can Help? Watch Now

Tags: Security Programs, Security Best Practices, Incident Response

Most Recent Posts

Subscribe to Email Updates