Intelligent CIO Europe Issue 24 | Page 19

LATEST INTELLIGENCE THE SECRETS OF EVALUATING SECURITY PRODUCTS PRESENTED BY Download whitepaper here C hoosing the right security products to suit your business is a serious problem. The risk of being compromised is real and there is a lot at stake. The cybersecurity landscape has changed significantly in the past decade. This book puts that into context and explains why modern challenges require next-generation tools. business management, security needs and operational requirements. The interplay of these drivers must be carefully managed to achieve a good product fit. However, this book is not simply a discussion of trends; it will provide you with a methodology to help you execute the product evaluation process. Starting with mapping your business needs, we explain step-by-step how you should determine those needs and what solutions would work best for you. There are detailed checklists in the appendices that will further support this process. Then we break down success criteria validation, looking in detail at drivers from the perspectives of www.intelligentcio.com A walkthrough of the evaluation process follows, with practical tips on where to start, pitfalls to avoid, and how to create success criteria that suit your business. Finally, we close with a head-to-head discussion between the authors, one who approaches the issue of security tool evaluation from the perspective of a vendor and the other who addresses the process from a CISO’s point of view. We hope that the resulting discussion adds some enlightening points and provides an enjoyable close to the book. n INTELLIGENTCIO 19