
Sign up to save your podcasts
Or


Coming out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace.
But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.
By Chad DupinComing out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace.
But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.