Effective security can help companies save in excess of $1 million on a nation-state attack from the likes of Vladimir Putin's Russia. Today’s columnist, Dan Pitman of Alert Logic, says as part of the equation, companies should focus requests-for-proposals around business goals vs. looking to bring on too many products. PalaciodoPlanalto CreativeCommons Credit: CC BY 2.0

They usually appear in the form of Excel spreadsheets or Word documents with a list of questions posed to a vendor about a potential cybersecurity procurement: Does the product work with big data? Is the solution compatible with Microsoft 365? Will I need to increase on-site storage for log data?

The vendor then checks off the yes-no boxes, and sends the responses back to the customer prospect. If the checked boxes and accompanying explanations work for the prospect, then the vendor advances to the next stage of a big sale.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.