LATEST INTELLIGENCE
THE SECRETS OF EVALUATING
SECURITY PRODUCTS
PRESENTED BY
Download whitepaper here
C
hoosing the right security products to suit
your business is a serious problem. The risk
of being compromised is real and there is
a lot at stake. The cybersecurity landscape has
changed significantly in the past decade. This
book puts that into context and explains why
modern challenges require next-generation tools. business management, security needs and operational
requirements. The interplay of these drivers must be
carefully managed to achieve a good product fit.
However, this book is not simply a discussion of
trends; it will provide you with a methodology to
help you execute the product evaluation process.
Starting with mapping your business needs, we
explain step-by-step how you should determine
those needs and what solutions would work best
for you. There are detailed checklists in the appendices that will
further support this process.
Then we break down success criteria validation,
looking in detail at drivers from the perspectives of
www.intelligentcio.com
A walkthrough of the evaluation process follows, with
practical tips on where to start, pitfalls to avoid, and how
to create success criteria that suit your business.
Finally, we close with a head-to-head discussion
between the authors, one who approaches the issue
of security tool evaluation from the perspective of a
vendor and the other who addresses the process from
a CISO’s point of view. We hope that the resulting
discussion adds some enlightening points and provides
an enjoyable close to the book. n
INTELLIGENTCIO
19