WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >
Before companies invest more of their budgets on new security technologies, they should make sure they're properly using what they already have, say industry analysts and security consultants.
"Are IT technologies being used efficiently? No. Are they optimized? No," says Michael Rasmussen, director of research and information security at Giga Information Group. "Does it mean companies need to outsource it all? No...they can handle this."
Paul Robertson, director of risk assessment at Herndon, Va.-based TruSecure Corp., says IT and security administrators need to take the time to focus on what's already in their shops.
Here are some suggestions -- from corporate users, analysts and security consultants -- for making sure your technology is being optimized: