There are so many Endpoint Security Products in the market and every solution has atleast one or more unique feature in their product. So, it’s a tough job for a CISO to choose one of them for his organization. However, a Best Fit Analysis would be best practice for each organization as per own business processes and Infrastructure.
Before the evaluation process one should identify and classify the critical and sensitive Data. Next, map them with different Business processes. Once this is done, the same should be linked with existing network diagram of the organization. This will help CISO to have clarity on overall data flow.
Based on the above analysis, CISO should prepare a generic checklist for vendors and give weighted score to each point. The Pugh Matrix helps to determine the potential solution in such evaluation.
(Read more: 5 Best Practices to secure your Big Data Implementation)
Following are a few topmost criterias:
- Market presence
- Respective industry experience
- No. of installations in the region/country
- Ease of implementation
- Combination of techniques
- VAPT
- Patch Management
- Application Control
- Endpoint Control
- Data Protection
- Mobile Device Management
- Others, if any
- Performance
- Consistency
- Proactiveness
- Usability
- Upgradability
- Flexibility
- Support and service
- Cost
- by Abdur Rafi, Corporate manager-IT, ABP Pvt. Ltd.
More: Want to become a speaker and address the security community? Click here
Comments