{"id":69828,"date":"2017-09-13T14:00:28","date_gmt":"2017-09-13T21:00:28","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=69828"},"modified":"2023-05-15T22:57:20","modified_gmt":"2023-05-16T05:57:20","slug":"3-key-tenets-to-help-with-security-management","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/09\/13\/3-key-tenets-to-help-with-security-management\/","title":{"rendered":"3 key tenets to help with security management"},"content":{"rendered":"

\"\"<\/a><\/p>\n

This post is authored by\u00a0Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group.<\/em><\/p>\n

Across industries, as attack methods have become more sophisticated and complex, organizations have been responding by deploying more security solutions, which in turn has tremendously increased the complexity of security management.<\/p>\n

Today, organizations must manage distributed resources across many environments, and given the constantly evolving threats, this means there are more attack surfaces that need to be protected.<\/p>\n

In some cases, an organization may end up having multiple point solutions even within a single workload to address specific security concerns. However, managing a growing number of individual security controls becomes a true nightmare. You lose visibility into the security state of that workload, let alone the security of the entire organization.<\/p>\n

Managing a high number of point solutions and vendors, coupled with the increasing \u2018noise\u2019 caused by diverse datasets with varying levels of fidelity, adds to the complexity of security management. It becomes harder to gain optimal insight into end points and results in even less visibility into the security posture of your entire network.<\/p>\n

Often, these point solutions don\u2019t share any information as they are not integrated, which leads to the most dangerous of your challenges: ineffective responses to threats that grow both in number and sophistication.<\/p>\n

More solutions to deploy and more vendors to manage, with less insight and ineffective threat response, ultimately manifests\u00a0in higher costs of security for CISOs as well.<\/p>\n

How can CISOs efficiently manage security?<\/h2>\n

In today\u2019s connected, technology-driven world, where digital transformation is the only way to survive for any organization, an efficient security management practice becomes the cornerstone of any long-term strategy of CISOs, regardless of their industry.<\/p>\n

Whether your assets are deployed in the cloud, on-premises, or\u00a0across a hybrid environment, your organization\u2019s security has 4 core components for you to manage and secure:<\/p>\n