Vendors are a necessary evil of the security industry. They make their money taking ours and, if we're lucky, they give us something useful in return. If we're unlucky, we wind up having to manage security incidents while simultaneously managing their broken technology. How can we tilt the odds in our favor? How can we identify which vendors are worth considering? We need detailed analytics. We need a way to independently compare vendors to one another using unambiguous metrics. This presentation compares vendors in many different categories and introduces a methodology for others to use. Ever had trouble making a decision about which vendor to pick when they all look very similar? This presentation will show you a way.
Josh More
Josh has over fifteen years of experience in IT and information security. Josh’s
current role is as a security consultant, and he has previously filled roles as
an application developer, system administrator and network engineer. He holds
several security and technical certifications and has served in leadership
positions on several security-focused groups. He writes a blog on security at
www.starmind.org and www.rjssmartsecurity.com. Josh’s current initiatives are
focused on applying lessons from other disciplines to security practice. Josh
More leads RJS Smart Security – a security consultancy focusing on smaller
organizations looking to improve security without losing flexibility.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek