4. Analysts, labs, and researchers. Security professionals aren't the only ones programmed for a best-of-breed approach to cybersecurity. In fact, the entire industry is built upon one-off evaluations and testing of individual security widgets rather than end-to-end architecture. This myopic analysis is no longer enough however. Analyst reports, product testers, and academics can certainly continue to evaluate the individual piece-parts but this work will become useless unless each "link" is appraised based on its individual merits AND its cooperation and contribution to the overall cybersecurity chain.
The title of this blog really says it all - the whole integrated cybersecurity architecture if far greater than the sum of its parts. Now the whole industry must adjust its behavior accordingly.
Source: Network World
Sign up for CIO Asia eNewsletters.