APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    Top 3 Challenges Growing Businesses Face and How the Cloud Can Help

    Ken Shulman, CIO & CTO, Broadview Networks

    right

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Tweet
    content-image

    Andre' Allen, CISO, City of Houston

    Much has been said about achieving the “single pane of glass” for enterprise security that will enable one to peer into the multitude of activities (malicious or otherwise) happening in real-time within today’s complex computer networks. Many security vendors proclaim loudly that their security products provide a “single pane of glass.” That is to say, that single dashboard display that will show you everything that is happening in your network and alert you to trends that indicate that you may have a security problem. But does the “single pane of glass” for enterprise security truly exist today or is it, in fact, elusive?

    The ideal “single pane of glass” would consist of a scalable analytics platform that provides compliance, information security, and forensics and incident investigation support. This analytics platform would seamlessly integrate with existing network/security components that provide the following:

    Data Loss Prevention (DLP), Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), Firewalls, Switches/Routers, Web Application Filter (WAF), Identity and Access Management (IAM), End Point Security (including malware prevention), Deep Packet Inspection (DPI) and Forensics, Desktop and Server Logs, Governance, Risk and Compliance (GRC), Service Management, Vulnerability Scans, and a Configuration Management Database (CMDB).

    The analytics platform would have intelligence technology built in at each interface to not only collect data from each component, but also to provide analytics capability to provide Log & Event Analysis and Log & Event Correlation. The analytics platform would also have interfaces to Security Operating Center (SOC) and Network Operating Center (NOC) Dashboards, as well as, to Situational Awareness and Threat Intelligence sources. Finally, it would provide a rich reporting capability and dynamic dashboards that present correlated data and comprehensive views.

    Let’s return to the question raised at the onset: does the “single pane of glass” truly exist today or is it, in fact, elusive? I contend that the “single pane of glass” does not exist today and it is elusive.However, there is a lot of promise on the horizon. The competitive security tool market has generated much movement in this regard. Progress is being made towards achieving the “single pane of glass.”

    Security tool vendors are becoming more aware of the need to (and are more willing to) leverage the Open API new technology. Open API new technology promotes the idea of different vendors establishing application programming interfaces that allow one product to seamlessly interface with another product, at the application layer, with minimum development and integration effort required. This affords the opportunity for the customer to leverage the best capabilities of differing vendor solutions without having to make what can sometimes be a large investment in software customization and integration testing. Based on my experience, I believe that it will be very difficult for a single security vendor solution to provide both the analytical and the automated processes needed to satisfy the visibility requirements of enterprise security. However, security vendors that adopt the Open API new technology concept will help the enterprise security community to go a long way towards achieving the elusive “single pane of glass.”

    It is also recognized that many of the large enterprise security solution providers are attempting to achieve the “single pane of glass” without adopting the Open API new technology concept. They are attempting to achieve this by various mergers and acquisitions of smaller security tool vendors that offer additional functionality that did not exist in their current enterprise security tool suite. This trend would likely render the open application programming interfaces (which may have previously existed before the security tool vendor was acquired) as proprietary. The current trend in security tool vendor acquisitions may result in some success in achieving the “single pane of glass.” However, it is the opinion of the author that this approach may limit the creativeness that generally comes with a “lean and mean,” focused small security tool vendor that is needed in the dynamic enterprise security environment that currently exists.

    In conclusion, it appears that the “single pane of glass” for enterprise security does not currently exist today. However, I believe that a “multi-paned window” for enterprise security does exist. This “multi-paned window” is comprised of multiple vendor solutions that adopt the Open API new technology. The collaboration of multiple vendors to achieve a common goal (to provide integrated capability and visibility for enterprise security objectives) has led to a window of opportunity. This creates an opportunity to be able to analyze information from disparate sources and, to put it simply, make some sense out of it. The “multi-paned window” would potentially utilize the “single pane of glass” of a Governance, Risk and Compliance (GRC) tool, the “single pane of glass” of a Security Event and Incident Management (SEIM) tool, and the “single pane of glass” of an analytics platform, to form the “multi-paned window” for enterprise security. This “multi-paned window” would provide an integrated view of system events/processes and the resultant effect on established security policies, plans, and procedures. The “multi-paned window” is not a “single pane of glass” for enterprise security, but it is nonetheless a “window,” providing the much needed visibility into the enterprise security space.

    Check this out: Top Enterprise Security Startups in APAC
    tag

    Startups

    GRC

    Information Security

    Identity and Access Management

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Artificial Intelligence - Myths And Truths

    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, Director, BT Business CIO
    The Future Relies on Augmented AI

    The Future Relies on Augmented AI

    Laurent Fresnel, CIO, The Star Entertainment Group
    Digitalization with the use of digital technologies/Improving business through digital technologies

    Digitalization with the use of digital technologies/Improving business through digital technologies

    Wilbertus Darmadi, CIO, Toyota Astra Motor
    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    Rick Stanbridge, VP & Chief Information Officer, Marco’s Pizza
    Bunnings  Diy Digital Transformation

    Bunnings Diy Digital Transformation

    Leah Balter, Chief Information Officer, Bunnings
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    Brad Dunkle, Deputy CIO, City of Charlotte
    Smart Community Innovation for the Post Pandemic

    Smart Community Innovation for the Post Pandemic

    Harry Meier, Deputy Cio for Innovation, Department of Innovation and Technology, City of Mesa
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/ciospeaks/enterprise-security-and-the-elusive-nwid-4223.html