Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Choosing a Security Monitoring Solution for Your Cybersecurity Portfolio
Cybersecurity

Choosing a Security Monitoring Solution for Your Cybersecurity Portfolio

Robert WoodBy Robert WoodApril 20, 20224 Mins Read
Facebook Twitter LinkedIn Email
Security Monitoring
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

The NIST CSF framework identifies five primary and essential domains of security activities: identify, prevent, detect, respond, and recover. Security monitoring and threat detection solutions align more closely with the domains of detect and respond. With such a dense market, it’s important to have clear means of identifying what solutions will work for you and your organization. Having a way to think about finding the right answer is more important than finding the right answer in one organization and taking it from place to place.

Cyber Defense Matrix

The cyber defense matrix is a model put together by Sounil Yu. It can be used in a variety of ways, one of which I’m personally a big fan of around vendor evaluation and portfolio management.

Mapping out a particular use case or class of technologies on the matrix is a useful way to identify coverage opportunities and gaps relative to the level of investment. One thing I like to do with the defense matrix tool is to expand each asset class category to be more representative of the environment I’m working in, on a more granular level.

For example, taking devices and breaking it down to:

  • Devices – Workstations
  • Devices – Mobile Devices (Corp-Issued)
  • Devices – Mobile Devices (BYOD)
  • Devices – On-Premise Servers
  • Devices – Cloud-Based Servers

Another example is with applications.

  • Applications – Custom-Built Applications
  • Applications – SaaS/PaaS
  • Applications – Self-Hosted COTS

Depending on the need for security monitoring, coverage can matter a great deal and you may need better coverage for particular asset classes.

The cyber defense matrix can also be used alongside a traditional decision matrix that maps out various features and cost elements.

Relation to Existing Cybersecurity Technology Portfolio

In this day and age, integrations are critical to an effective portfolio. Technology solutions need to be able to work effectively alongside other solutions to get the most value out of them. Otherwise, your team (or extended team) will be spending valuable time and resources analyzing and pulling context out of one solution and making it work in another.

A specific example of this is connecting a monitoring and alerting solution to a case management solution, where details and incidents are tracked. Ideally, details and context from various monitoring, detection, and alerting solutions can automatically push details into a case management solution for analysts to consume and to aid reporting.

Whenever evaluating a new cybersecurity technology, it’s important to consider it alongside your existing portfolio. Unless other things in your portfolio are subject to change alongside this new solution, then it needs to be considered together. Specific things to look for include, but are not limited to:

  • An accessible and well-documented API
  • Specifically built out integrations for tools you use
  • A team that is willing to hear you out and build integrations upon request (prioritized accordingly)
  • Connectors built for the new solution with any SOAR tools you may use

Operations and Maintenance

Tools, nowadays, have a wide range of deployment models, each of which influences the cost and amount of work that needs to happen. The team resources available to you should be an influencing factor in the decision. That said, this needs to be considered alongside the security posture you’re comfortable with, features, integration opportunities, cost, and coverage.

SaaS-based delivery models will oftentimes allow you to deploy and get started with the most speed and stability. There is no installation process. There is no setup of servers and network resources. Inversely, self-hosted deployment models may require a bit more initial setup time. However, it will allow you to control more of the overall technology stack and security as well as may allow you to scale more cost-effectively.

Because security monitoring is just one part of an overall effective security strategy, this cannot be the sole focus of your entire team. Your team’s bandwidth to manage, operate, and administer solutions must be considered. If you use a managed security solutions provider (MSSP), this may be more feasible after the initial setup.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity cybersecurity as an enabler featured monitoring security
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

SAP vs. Salesforce: Battle for AI and Data-Cloud Leadership Intensifies

June 2, 2025

SAP vs. Salesforce: In AI Era, Battle Shifts to Data Cloud + Agents

June 2, 2025

Google’s Vision for Gemini Super Assistant, Universal Capabilities

May 30, 2025

Accelerate, Assist, Transform: A Framework for AI Adoption Success

May 30, 2025
Add A Comment

Comments are closed.

Recent Posts
  • SAP vs. Salesforce: Battle for AI and Data-Cloud Leadership Intensifies
  • SAP vs. Salesforce: In AI Era, Battle Shifts to Data Cloud + Agents
  • Google’s Vision for Gemini Super Assistant, Universal Capabilities
  • Accelerate, Assist, Transform: A Framework for AI Adoption Success
  • Google Offers First-of-Its-Kind GenAI Certification for Managers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.