Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:26 PM
Connect Directly

6 Tips For Doing More Security With Less

Security ranks as a top priority in many IT budgets, but this year the money may not be there for many organizations -- here's how to get creative

3. Get more out of your existing security tools and systems.

Look at your organization's existing Citrix or other terminal servers, for instance. "You might [realize] you've got this wonderful resource called Windows Terminal Server...where you can put some of your sensitive assets and eliminate the need to buy a separate product," Forrester's Jaquith says. Rather than purchasing an expensive data protection suite for your endpoints, you can use a Citrix box to help with data protection, he says.

"If the business requires users to be able to process bulk quantities of sensitive information on endpoints, you will still need either encryption tools or [data leakage prevention]," he says.

Consider reorienting the more labor-intensive tools, such as those for data leakage prevention (DLP), he says. Forrester recommends using DLP products mainly for monitoring activity rather than for blocking the leakage of data. And enlist the help of your business units to get the big picture on where data is flowing in the organization. "If you are looking at DLP to stop a data leak, you're probably a little too late. You need to understand how users are using the information they have, what they are downloading, [etc.]," he says.

Meanwhile, some security purchases are definitely non-negotiable. You can't skimp on purchases tied to compliance, regulation, or any auditor red-flagged issues, experts say. "For the most part, your compliance budget is not negotiable," Jaquith says.

4. Tie a security purchase to your compliance mandates.

Speaking of compliance, it can come in handy for helping fund security. Many organizations already employ this tactic, and it's an effective way to get a security purchase through. "The key is finding an angle that clearly ties it to a compliance mandate. That means getting specific," Jaquith says. If you handle payment data, for example, use PCI.

"A Web application firewall is a good example here because PCI DSS specifically calls out for code audits, code review, or WAF as a way to mitigate risks in application security," he adds.

5. Outsource or automate some security functions.

Security doesn't have to do it all in-house. Automating or outsourcing things like data provisioning or data entitlement can save big bucks. Johnnie Konstantas, vice president of marketing for Varonis, which sells automated data entitlement tools, points to the high cost of manpower in data governance tasks.

"A lot of where the money is being spent is in people, and it's being done inefficiently," says Konstantas, citing organizations that have people manually mapping users to data on file shares as an example. "That's a huge pool of data, and they're spending tons of money on IT people manually assigning permissions for who can get to what."

WhiteHat's Grossman says it makes sense to divvy up labor. And that can include farming out some security tasks if doing so is cheaper. "Often, outsourcing particular security functions, such as vulnerability assessment or intrusion detection, can lower the total cost of ownership of a particular action," he says.

6. Take advantage of a security buyer's market.

Enterprises aren't the only ones feeling the pinch of the economy. Security vendors are, too.

"Reasonable security vendors will be flexible on pricing and payment terms, especially when they know you are well-informed about competing solutions," WhiteHat's Grossman says. "Ask for additional discounts if purchasing decisions are made quickly, or by committing to multiyear contracts. Then once you've selected a solution you really love, forge close relationships and help the vendor evangelize by serving as or reference or case study."

That can pay off in the long term, too. You can get speedier support, influence on their product road maps, access to their more "seasoned" engineers, and more discounts down the line, Grossman says.

So far, few enterprises are taking advantage of this buyer's market, however, because they don't realize some vendors are willing to wheel and deal. "People are crossing off solutions they 'can't afford' without first investigating and trying to negotiate," Grossman says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
PUBLISHED: 2019-12-05
Exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation m...
PUBLISHED: 2019-12-05
An Information Disclosure vulnerability exists in the Jasig Project php-pear-CAS 1.2.2 package in the /tmp directory. The Central Authentication Service client library archives the debug logging file in an insecure manner.
PUBLISHED: 2019-12-05
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash...