Connect with us

Expert Speak

Why an Open, Single-Vendor Security Solution is a Win for Businesses

Published

on

Written by Rudie Opperman, Regional Manager, Engineering & Training, Middle East & Africa at Axis Communications

Building security solutions used to be a binary choice. In general, if an organisation had more complex needs and wanted a best-of-breed solution, it would opt for a multi-vendor set-up. If their needs were simpler, or they wanted an easier option to service, they chose a proprietary, single-vendor solution. But this often resulted in vendor lock-in that limits growth potential. If organisations wanted to upgrade to a more advanced video management system or cameras or add access control technology and other devices that weren’t in the vendor’s portfolio, their only option was to replace everything.

Today, however, there’s a third option – the open-platform, single-vendor solution. As a non-proprietary solution, it provides users with the best elements of both previous options. This approach gives customers the simplicity they need without being locked in with one vendor. And, as their needs become more complex, they keep the ability to scale the initial investment by integrating it with other vendors’ open-platform devices and software.

Before selecting an approach to security services, it’s important to explore the wide range of advantages afforded by an open, single-vendor security solution.

Quick and Easy Design and Purchase
In a traditional mix-and-match solution, one should consider whether those devices and software are compatible and allow access to all the features of those products. At the end of the day, systems integrators don’t just need a variety of components. They need a portfolio that’s designed to work together seamlessly and deliver full functionality, and a single-vendor solution can provide just that.

In a multi-vendor solution, you also often deal with different pricing structures and licensing agreements. But with a single vendor, all those details are coordinated with one source – how many licenses you’ll need, how frequently they’ll need to be updated, or whether the devices purchased come with one-time licensing fees that include upgrades.

Simple Installation, Management, and Security
Having a single point of contact can provide advantages to an integrator across a project’s lifecycle. If an installer must take more time on site than originally projected, an integrator starts to lose money. With a single-vendor solution, you have products you know have been designed and pre-tested to work well together, which reduces labour costs and shortens the initial setup time.

Once a security solution goes live, managing all the moving parts can be a challenge. With a single-vendor solution, it’s far easier to gain a holistic overview of the installation site and complete control over all devices. This greatly simplifies identifying devices on the network as well as managing system updates, outages, and other ongoing maintenance activities.

In terms of cybersecurity, there are significant differences between a multi-vendor solution and a single-vendor approach. A multi-vendor solution makes it difficult to ascertain whether all the vendors are maintaining the same high level of cybersecurity. Incomplete or untested cybersecurity measures in one vendor’s products could compromise the security of another vendor’s technology. But, with a single-vendor solution, it’s easy to apply relevant cybersecurity updates across the entire solution and respond more rapidly to threats.

One Point of Contact for All Support
In a multi-vendor solution, it’s often more difficult to determine where the problem lies and whose products are at fault, because there are so many potential points of failure. In a single-vendor solution, there’s only one company to hold accountable. It eliminates all the guesswork, all the running around in circles, and the endless phone calls.

Of course, there can be downsides to putting all your eggs in one basket – especially if it’s with the wrong vendor. It’s important for integrators to look for a trusted vendor with a broad portfolio of support services, a reliable product warranty, and a transparent replacement policy if something fails. Integrators should also make sure they offer an open platform that allows for integration with third-party devices if the need arises in the future. In the long term, having an open API, interoperability standards such as ONVIF, and custom integration services can prove invaluable.

A Partnership that Promotes Mutual Success
When a systems integrator decides to go with a single-vendor solution, the close connection that develops between the two companies is often more difficult to sustain in a multi-vendor environment. With a single-vendor solution, they can focus on developing expertise in a single portfolio. And, to support that effort, vendors offering value-adding partner programs can further enhance an integrator’s proficiency in their products and applications.

It is also crucial to partner with a vendor who has a clear roadmap for the future – one that includes ongoing product development and a long-term commitment to the security industry. Long-term vendor support is critical to maintaining a successful business operation. But it isn’t just about being able to call the company when something goes wrong. It’s about having a partner who supports you through the entire project lifecycle – from concept to installation and beyond.

The Importance of Weighing all Your Options
Security solutions come in all shapes and sizes. Some are extremely complex. Some are bare bones. Some are proprietary. Others are based on open standards. The direction you choose will depend on what best matches your specific needs.

An open, single-vendor security solution is a truly cost-effective option because it allows you to build on your initial investment. You can create a security and surveillance system that satisfies simple needs today – without limiting its potential to grow in the future.

Artificial Intelligence

How AI is Reinventing Cybersecurity for the Automotive Industry

Published

on

Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)

Continue Reading

Cyber Security

Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits

Published

on

Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.

Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.

Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.

Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.

Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”

Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.

Continue Reading

Expert Speak

What the Bybit Hack Reveals About the Future of Crypto Security

Published

on

Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.