Security professionals: what considerations do you look for when evaluating vendors?
Cost of vendor solution.19%
Length of time until my company would have to go through the vendor evaluation + onboarding cycle again.43%
How easy it’d be to integrate with our existing tech stack.23%
How easy it will be for employees at my company to learn and use the tool.5%
How well the product meets our business needs.9%
Content you might like
Patch management: to reduce attack surface and avoid system misconfigurations39%
Malware and ransomware prevention: to protect endpoints from social engineering attacks59%
Malware and fileless malware detection and response: to protect against malicious software49%
Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls33%
Not planning to change endpoint security strategy9%
Each brand has separate teams, tools and workflows.13%
Each brand has separate tools and workflows, but centrally managed by one team.67%
All tools and workflows are centralized across all brands, and managed manually by one team.17%
All tools and workflows are synced and automated through a centralized vendor.3%