Perimeter
1/28/2013
12:32 PM
Mike Rothman
Mike Rothman
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Security No-Man's Land

As the industry descends on the RSA Conference to discuss the latest and greatest in security, the underserved midmarket continues to struggle with basic blocking and tackling. The industry machinery is not built to solve that problem

I'm not much of a tennis player, but I remember from my lessons as a kid that area between the baseline and the service boxes is a bad place to be. A hard ground stroke will get past you, and you aren't close enough to volley. If you get caught in no-man's land, then your chances of winning the point are not very good.

In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being below the "Security Poverty Line." These folks have a couple hundred to a couple thousand employees. That's big enough to have real data interesting to attackers, but not big enough to have a dedicated security staff and the resources they need to really protect anything. These folks are caught between the baseline and the service box. They default to compliance mandates like PCI-DSS because they don't know any better. And the attackers seem to sneak those passing shots by them on a seemingly regular basis.

In a few weeks the security industry will descend on San Francisco for its self-aggrandizing, antennae-rubbing annual ritual, the RSA Conference. We'll see all sorts of shiny objects and companies claiming to block this and block that. If you believe the hype, then you'd think we're actually winning the battles out there. A security n00b leaves RSA figuring that buying the latest overhyped widget will fix the issue. We all know the folly of that thought.

The problem is the security industry, in general, in the personification of the largest industry conference, caters to the large enterprise. What's another box in yet another rack? The seven-figure CISO signs the PO for two. They'll try anything, and they should. What's the issue taking technology that is largely a science experiment and throwing a bunch of bodies at it to make it kind of functional? Those folks have the resources, and they can't take the risk they'll miss something that could help. But that's not representative of most of the world, and certainly not those in security no-man's land.

Back when I was on the vendor side, I'd joke about how 800 security companies chased 1,000 customers -- meaning most of the effort was focus on the 1,000 largest customers in the world. But I wasn't joking. Every VP of sales talks about how it takes the same amount of work to sell to a Fortune-class enterprise as it does to sell into the midmarket. They aren't wrong, and it leaves a huge gap in the applicable solutions for the midmarket.

Well, that's not exactly true. A lot of service providers now offer SecaaS (yes, a terribly unfortunate acronym) to get smaller companies out of the business of monitoring firewalls or blocking spam. You are starting to see more purpose-built security products for the midmarket, which is helpful, but it's not a solution. Too many of these offerings are dumbed-down enterprise products, which doesn't really solve the midmarket company's problem.

What folks in security no-man's land need most of all is a security program. They need an adviser to guide them through the program. They need someone to help them prioritize what they need to do right now. They have some resources, but not a lot. They don't want or need someone to do everything for them. And they certainly don't need a shiny object to stop the attack du jour. They don't need a box pusher to install whatever gear has the best distributor incentive that month. They need a partner -- someone to help them with blocking and tackling.

Dan Geer is exactly right in his recent column talking about these midmarket security challenges. I really like Dan's idea about a "mentor" to help the midsize company figure how to prioritize their controls. With the advent of maturing packet capture and security analytics with a little dose of Moore's Law thrown in, it's close to being possible to monitor a modestly sized network for a couple of days and figure out what needs to be fixed first, second, and third.

To be clear, folks in security no-man's land don't go to the RSA Conference, probably don't read security pubs, or follow the security echo chamber on Twitter. They are too busy fighting fires and trying to keep things operational. And that's fine. But all of the industry gatherings just remind me that the industry's machinery is geared toward the large enterprise, not the unfortunate 5 million other companies in the world that really need the help.

Mike Rothman is President of Securosis and author of The Pragmatic CSO Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kjhiggins
50%
50%
kjhiggins,
User Rank: Strategist
1/28/2013 | 9:10:45 PM
re: Security No-Man's Land
Seems like there should be a way to reach out to the no-man's land companies...maybe some sort of virtual conference for them that runs in conjunction with RSA?

Kelly Jackson Higgins, Senior Editor, Dark Reading
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-5522
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6025. Reason: This candidate is a reservation duplicate of CVE-2014-6025. Notes: All CVE users should reference CVE-2014-6025 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-5523
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5524. Reason: This candidate is a duplicate of CVE-2014-5524. Notes: All CVE users should reference CVE-2014-5524 instead of this candidate. All references and descriptions in this candidate have been removed to prevent acciden...

CVE-2014-5575
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE-2014-5665
Published: 2014-09-22
The Mzone Login (aka com.mr384.MzoneLogin) application 1.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio