Perimeter
3/27/2012
10:28 PM
Commentary
Commentary
Commentary
50%
50%

A Single 'Pain' Of Glass?

Is the often-pitched 'single pane of glass' a benefit to security monitoring tools or yet another point of contention?

Promising the coveted "single pane of glass" for all levels of the organization to leverage, vendors are hoping to bring their products to bear in support of the entire business stack -- from the entrenched security practitioner at the bottom to the executive branch of the organization.

One problem with a single pane of glass is that (marketing analogy aside) glass is fragile and is likely to shatter should someone or something apply too much pressure or weight upon it. If one were to straddle a large pane of glass between two tables and begin piling boxes upon it, the glass would inevitably shatter when it could no longer manage the weight. Another problem with the single pane of glass analogy is that, on one hand, it provides visibility into the mountains of collected data and subsequent intelligence (such as alerts, reports and tickets), but on the other hand, it also generates a much larger field upon which to focus.

Think of a small glass bottom boat that allows you to view the ocean floor. If it's a relatively small pane of glass you can easily focus your gaze on what's important -- tropical fish, coral, and maybe even a shipwreck. Now take a cruise ship and give it a glass bottom. Not only will it be difficult to focus on particular items of interest, but you may also have to push other cruise-goers out of the way to see the same item.

Vendors must be wary about bolting on features and functionality haphazardly lest it result in their customers being impaled by shards of broken (and painful) glass.

The ideal solution: A dashboard-like analytics interface that allows the end user to represent the data that THEY care about with as much or as little visualization as THEY deem appropriate or relevant. Though vendors believe canned dashboard widgets ultimately help the end user (and in some cases they do), a user can dull the "pain of glass" if presented with a tool that allows for the massage of the data into the widgets or data presentation elements that are dynamic, easy to manipulate, and highly configurable for the organization.

Vendors need to start caring less about canned widgets and more about malleable data presentation capabilities.

Andrew Hay is senior analyst with 451 Research's Enterprise Security Practice (ESP) and is an author of three network security books. Follow him on Twitter: http://twitter.com/andrewsmhay

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.