In an increasingly digital world, companies continuously face the threat of cyberattacks. Current advances in artificial intelligence (AI) promise significant improvements in detecting and defending against such threats.

However, it is no secret that attackers are increasingly using AI. Cyber criminals leverage AI and machine learning to optimize and automate attacks. AI-driven malware can quickly adapt to new security measures and exploit vulnerabilities in real time. These AI tools enable cyber criminals to scale their attacks and employ highly complex methods to bypass traditional security mechanisms and remain undetected. Additionally, attackers use advanced algorithms to make phishing attacks more precise.

In this context, Palo Alto Networks (PANW) recently announced the acquisition of IBM’s QRadar Software-as-a-Service (SaaS) business. This marks the second merger in the traditional security information and event management (SIEM) market this year, following the merger of Exabeam and LogRhythm. These developments followed Cisco’s earlier acquisition of Splunk.

Amidst these dynamic market conditions, choosing a future-proof technology architecture for threat management becomes almost inevitable. This underscores the necessity of selecting the best technologies and the right strategic approach.

There are two approaches: deploying the best individual solution or integrating a comprehensive platform.

Best-of-breed approach

The best-of-breed approach allows companies to select the best product for each security area. This results in a tailored solution optimally aligned with individual requirements and business processes. The main advantages include:

Specialized products: Companies can choose from various providers and select those that offer the best solutions for their needs. For example, a company might choose a leading SIEM solution from one provider and a highly specialized endpoint detection and response (EDR) solution from another to ensure all aspects of their security architecture are optimally covered.

Flexibility and agility: The best-of-breed approach allows companies to respond flexibly to new threats and changes in business requirements. When a new technology comes to market, companies can easily integrate it without overhauling their entire security architecture. This promotes agile adaptation and quick implementation of new solutions to stay current with the latest technology.

Avoid vendor lock-in: Companies avoid dependence on a single vendor by using products from various providers. This reduces the risk of being tied to a suboptimal solution if the company’s requirements change or the vendor encounters problems. Companies can easily replace products and integrate new vendors without significantly changing their infrastructure.

Best-of-breed challenges

Despite these advantages, the best-of-breed approach also has some drawbacks:

Integration complexity: Integrating products from different providers can be technically challenging and time-consuming. Different systems must be able to communicate and exchange data, which can lead to interoperability issues. This technical complexity can extend the implementation time to ensure all systems work seamlessly together.

Increased resource requirements: Operating and managing a heterogeneous security infrastructure requires specialized expertise and continuous training. Employees need to be able to work with various systems and technologies, increasing the demand for specialized security professionals. This can lead to higher operational costs as training and system management require more time and resources.

Costs: Procuring the best available technologies can be expensive. In addition to high acquisition costs, maintenance and license fees can also be significant. Companies must carefully weigh whether the improved security benefits justify the additional costs or if more cost-effective, less specialized solutions would suffice.

Explore IBM’s threat management services

Platform approach

A platform offers an integrated solution provided by a single vendor. This has several advantages:

Seamless integration: All platform components are aligned from the start and work harmoniously together. This facilitates interoperability and data exchange between the various platform modules. Companies benefit from a unified view of their security posture and can detect and respond to threats quickly and efficiently.

Automation and efficiency: Security processes can be automated and centrally managed with a single user interface. This enables faster responses to threats and reduces the manual effort required from security staff. Automated workflows allow routine tasks to be performed more quickly and consistently, enhancing overall operational efficiency.

Reduced complexity: Managing an integrated platform is less complex than managing multiple independent systems. This reduces the training requirements for security staff and minimizes the risk of errors arising from the complexity of integrating different systems. A unified platform allows security teams to focus on strategic security initiatives rather than dealing with technical integration issues.

Cost efficiency: A unified platform can often lead to lower overall costs as the need for multiple separate licenses and maintenance contracts is eliminated. Companies can benefit from bundled discounts and better control their expenditures. Additionally, management costs are reduced as fewer resources are required for system integration and management.

Platform challenges

Just as best-of-breed approaches are not a perfect solution, using a platform is not without challenges:

Limited functionality: There is a risk that a single platform’s functions will not cover all of a company’s specific security requirements. Some specialized security functions might be missing or less mature than with best-of-breed solutions. Companies must ensure that the chosen platform meets all critical requirements and does not leave significant gaps in their security strategy.

Vendor lock-in: Dependence on a single vendor can be problematic if the vendor encounters difficulties, such as financial issues, lack of innovation or poor customer service. Switching to another vendor can be expensive and time-consuming, as almost the entire security architecture needs to be rebuilt. Companies should carefully weigh the risk of vendor lock-in and develop strategies to minimize this risk.

Multiple stakeholders: Opting for a platform solution may require more coordination within the company, as different departments and stakeholders need to be involved. This can prolong the decision-making process and require additional resources to consider all stakeholders’ needs. Careful planning and coordination are necessary to implement the platform successfully.

Choosing future-proof technology architecture

The decision to choose a best-of-breed approach or a platform depends on several factors, such as the company’s specific security requirements, budget, internal expertise and long-term strategy. While best-of-breed solutions offer greater flexibility and specialized functionalities, the platform approach enables seamless integration and reduced complexity.

Ultimately, the choice should efficiently meet the company’s security goals. It is crucial to invest in advanced technologies and ensure that expenditures are proportionate to the risk. This means that investments should be carefully weighed without incurring unnecessary costs.

IBM can help you develop the optimal threat management strategies, processes and architectures to address your security challenges. Check out our Cyber Threat Management Services website.

More from Risk Management

What can businesses learn from the rise of cyber espionage?

4 min read - It’s not just government organizations that need to worry about cyber espionage campaigns — the entire business world is also a target.Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the world’s great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and economics. Global political risk has reached its highest level in decades, and even though corporate attention to geopolitics has dropped since peaking in 2022, the impact…

Cost of a data breach: Cost savings with law enforcement involvement

3 min read - For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures and other simple metrics creates a relatively level playing field for most stakeholders, including law enforcement.IBM’s 2024 Cost of a Data Breach (“CODB”) Report helps…

How Paris Olympic authorities battled cyberattacks, and won gold

3 min read - The Olympic Games Paris 2024 was by most accounts a highly successful Olympics. Some 10,000 athletes from 204 nations competed in 329 events over 16 days. But before and during the event, authorities battled Olympic-size cybersecurity threats coming from multiple directions.In preparation for expected attacks, authorities took several proactive measures to ensure the security of the event.Cyber vigilance programThe Paris 2024 Olympics implemented advanced threat intelligence, real-time threat monitoring and incident response expertise. This program aimed to prepare Olympic-facing organizations…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today