The cybersecurity consolidation conundrum

Issue 3 2022 Editor's Choice, Information Security, Healthcare (Industry)

While employees and organisations are busy settling into remote or hybrid working, cybersecurity professionals continue to grapple with the challenges that come with a rapidly expanding network perimeter. And with every new ransomware attack that hits the headlines, it would be fair to assume that adding more security products or vendors would make a company more secure. But that’s not the case.

According to a recent survey, conducted with Vanson Bourne, one of the biggest challenges of securing a remote workforce is in fact managing multiple point-products or vendors. This is due to poor visibility and gaps between the protections that each product delivers, not to mention the complexity (and higher cost) of managing multiple vendor relationships. Almost all respondents in the survey (87%) believe that consolidation is an important part of securing the remote workforce, yet despite knowing this, over half (54%) reported that their organisations use more than 10 point-products. The healthcare sector is furthest behind the curve in this regard, with nearly eight in 10 organisations using more than 10 separate point-products.

So, what’s holding organisations back? If the benefits of consolidation are so clear, why aren’t more doing it?

Saturated security market

One of the key reasons organisations are falling behind when it comes to consolidation is that decision-makers are, to all intents and purposes, spoiled for choice. The security market is heavily saturated at the moment, particularly in light of the move toward remote or hybrid working. Yet, despite organisations needing more robust security measures than ever before, budgets are tight and many feel pressured to focus only on the specific problem they face today, instead of considering more long-term strategic approaches. This is particularly true of the healthcare sector.

There are many reasons behind this tendency, not least the concept of vendor lock-in, which is still highly prevalent in the industry. Ongoing subscriptions make it difficult for organisations to switch vendors. Likewise, it’s becoming increasingly difficult for vendors to get customers to commit to a relationship spanning multiple years. Such relationships take time to nurture and reach their full potential, so many organisations are using a smaller number of vendors rather than committing to a single one.

This multi-vendor approach might offer a fix for short-term problems, but it puts a great deal of strain on security teams who might not have the resources to adequately vet every product or vendor. CISOs might have a good idea of what’s best for their own organisation, but it’s difficult to apply that knowledge to an ever-expanding list of disparate vendors that are pulled together under one umbrella.

Healthcare organisations have complex networks

As healthcare is the least consolidated sector, it’s an ideal point of focus for a discussion on what might be holding consolidation back. It’s also a sector that’s ripe for consolidation and arguably stands to benefit the most, with a network footprint spanning everything from laptops to critical medical equipment like MRI scanners and kidney dialysis machines.

Because healthcare is a 24/7/365 industry, any downtime to change or introduce new consolidated technologies is not an option that is often considered. In fact, disruption to normal service is probably what’s holding most organisations back from adopting a more consolidated cybersecurity infrastructure. However, there is no reason why the introduction of a carefully planned consolidated platform implementation should cause any disruption to business or indeed patient care.

To stay safe in today’s increasingly dangerous threat landscape, cybersecurity requires an integrated and consolidated approach that covers all the bases, from endpoint to data centre to cloud. While this is technically achievable with a multi-vendor approach, it’s simply not viable for organisations that want to take a long-term, streamlined and cost-effective approach to security. For those organisations, consolidation is the answer.

Find out more at www.checkpoint.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.