Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

3 tips to better manage tool sprawl to maximize existing spend

By Damian Chung
black keyboard with blue lights

Image via Unsplash

February 2, 2024

Every security leader has, at one time or another, been faced with the challenge of maximizing the value they get from their existing toolset. But that can be even more difficult as adversaries continue to aggressively evolve and security budgets remain limited. In fact, more than one-third (36%) of organizations report that an inadequate budget is their biggest internal cybersecurity challenge. 

When making cybersecurity plans for the coming year, first try to make sure that everything in our environment is fully utilized while eliminating waste and redundancy. Research shows that most organizations use 10% to 20% of the technology they own, squandering precious budget dollars on unnecessary license costs.

Many vendors will also update solution features throughout a tool’s lifecycle. But unfortunately, security teams are often too busy to go back and optimize things post-deployment — and by some estimates, the number of security products in the average enterprise security stack now runs as high as 130. This means security leaders may be missing out on critical new capabilities and protections that you’re already licensing.

Regardless of the economic forecast, it’s always smart to get the most from existing investments before adding new security products and services to your environment. So, in order to maximize a budget, security leaders need to analyze and optimize before they modernize.

Analyze: Know the enemy

When it comes time for security leaders to plan for the year, the easiest thing is to stay “status quo” — don't change anything. If security leaders change something and it breaks, then there’s a risk of looking bad. But staying static also carries the even higher risk of doing nothing while the threat actors evolve and find new ways to exploit defenses. 

So, the first step is to analyze the landscape. Are there things to improve in our stack to account for emerging threats or new vulnerabilities? There are things to learn from recent news items like the attacks against the casinos. Security teams can use these kinds of real-world circumstances to go back and figure out if they have the right protections and policies in place.

The challenge is that this takes cycles — and most people don't have spare cycles across teams. We don't have people sitting around and waiting for a project. Probably the hardest part is realizing that it’s necessary to invest time and not just money in order to get more efficient results from a program. 

Optimize: Use what’s already there

Before allocating budget dollars to purchasing a new tool to cover a security gap, CISOs should first be sure they’re already using what they have to full capacity. Tool sprawl is a real problem — and not just in terms of spending. Complexity is the enemy of security. One-off security products that operate in silos can actually introduce inefficiencies and new vulnerabilities to infrastructure. 

Try to take advantage of quarterly business reviews and executive briefings with vendors throughout the year to make sure security teams are tuning the tools that they’re already licensing and getting full benefit from the latest feature sets. A basic rationalization of the security tools in a stack can yield an estimated savings 5% to 10%.

It can be challenging to find time for this — especially while coordinating 20 different vendors that each want to do a quarterly review. But vendors can help quickly improve efficiencies and even spot capabilities that haven't been turned on yet. It’s also important to understand the road map for their technologies and develop a relationship. Security leaders are going to need their help at some point; they're not just there to try to upsell. Ultimately, vendor reps want to make sure that a partnership is going to be successful because, quite honestly, the last thing they want to hear is that a customer is having an incident that will wind up in the news. 

And sometimes when listening to a vendor talk about their latest solutions, security leaders think of a different path to achieve the same end. Maybe there’s even a way to incorporate what the organization already has in their stack and tweak it to address that same common problem.

Modernize: Make strategic upgrades

Once security leaders have analyzed their risk exposures and optimized their current infrastructure, they’re in a much better position to make informed decisions about how to strategically allocate the budget for the upcoming year. Modernizing the tool stack can improve efficiencies and potentially save the organization money over time. This can offer significant business value — and CISOs should bring that information into C-suite discussions to justify targeted spending, even in lean times.

Better security for any budget

While cybersecurity remains a critical investment for maintaining financial and operational resiliency, smart security leaders know that greater program efficiency leads to greater program efficacy. A solid plan starts with analyzing the organization’s current stack in light of today’s threat landscape. Look for low-cost and no-cost opportunities to cover security gaps through tuning and optimization.

KEYWORDS: security budget security business strategy security planning security system integration tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Damian Chung is Business Information Security Officer at Netskope.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security network

    The three challenges of network tool sprawl and how to solve them

    See More
  • cloud-security-fp1170x658v05.jpg

    3 ways to fight cloud sprawl

    See More
  • workplace-enews

    Top Benefits of Using Technology to Better Manage Security Workforces

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing