8. Building Effective Security into Acquisitions

Assured Visibility, Control, Compliance for Effective Security

Community Member kudos icon + Community member

The evolution of the cyber attacker’s techniques, skills and tools has far exceeded the pace of the cyber defender’s. Throughout the public and private sector, from federal agencies to health insurance providers, emerging threats continue to wreak havoc on enterprise networks, applications and data. Incident response teams must move faster, but the tools they’ve been given to do the job aren’t fast enough in detecting, remediating or investigating incidents, especially at scale. New solutions are needed that enable IT operations and incident response teams to move quicker and act smarter across distributed networks, distributed clouds, and OS platforms while maintaining scalable performance.


The government would also benefit from reexamining the thinking behind how it approaches cybersecurity. A reevaluation of the efficacy of siloed efforts could help the government move from a layered approach to a more holistic approach. Siloed tools—which collect fragmented and outdated data—create a disconnect between the detection and remediation of security issues, making it much more difficult to boost the cybersecurity posture of the government as a whole.


One of the greatest limitations in building effective security into acquisitions is an agency’s ability to rapidly integrate new environments and unify existing processes and policies to ensure fast and complete visibility and control is maintained. As networks continue to grow and become ever more complex, organizations need to be aware that this task becomes increasingly challenging with every new acquisition, as many legacy tools are simply not designed to scale seamlessly and perform well across highly distributed networks. Furthermore, there are often situations where teams may not always be aware of recently completed acquisitions. In these cases, organizations need solutions that provide the ability to rapidly detect unmanaged assets joining their network so that they can swiftly investigate the assets’ origin and take the necessary action as quickly as possible. Lastly, acquisition targets often operate under different guidelines or policies. Therefore, platforms need to provide the necessary level of control to quickly enforce compliance and consistency across every new system coming under management. This will ensure violations are quickly corrected so that there is no lapse in the desired security posture.

URL relevant to your idea (include http://) http://www.tanium.com

Add tags and help us assess and classify your idea. Pick from the list below or type in a new tag.


0 votes
Public Input
Idea No. 141