{"id":22278,"date":"2022-06-10T16:17:09","date_gmt":"2022-06-10T16:17:09","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22278"},"modified":"2022-06-10T16:17:11","modified_gmt":"2022-06-10T16:17:11","slug":"most-security-product-buyers-arent-getting-promised-results","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/","title":{"rendered":"Most Security Product Buyers Aren&#8217;t Getting Promised Results: RSA Panel"},"content":{"rendered":"\n<p>About 90% of security buyers aren&#8217;t getting the efficacy from their products that vendors claim they can deliver, according to a panel at this week&#8217;s RSA Conference that also offered some solutions to begin to fix that problem.<\/p>\n\n\n\n<p>Joe Hubback of cyber risk management startup ISTARI led both the panel and the study, which was based on in-depth interviews with more than a hundred high-level security officials, including CISOs, CIOs, CEOs, security and tech vendors, evaluation organizations and government organizations.<\/p>\n\n\n\n<p>Hubback said that &#8220;90% of the people that I spoke to said that the security technologies they were buying from the market are just not delivering the effect that the vendors claim they can deliver. &#8230; Quite a shocking proportion of people are suffering from technology that doesn&#8217;t deliver.&#8221;<\/p>\n\n\n\n<p>A number of reasons for that product failure came out in the panel discussion, but they can be boiled down to some key points:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cybersecurity buyers are pressed for time and most don&#8217;t test the products they buy. &#8220;They&#8217;re basically just buying and hoping that the solutions they&#8217;re buying are really going to work,&#8221; Hubback said.<\/li><li>Vendors are under pressure from investors to get products to market quickly and from sales and marketing teams to make aggressive claims. On top of those pressures, it&#8217;s difficult to architect tools that are effective for a range of complex environments &#8211; and equally difficult for buyers to properly assess these &#8220;black box&#8221; solutions.<\/li><\/ul>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\">Latest MITRE Endpoint Security Results Show Some Familiar Names on Top<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A &#8216;Market for Lemons&#8217;<\/h2>\n\n\n\n<p>Those dynamics create an &#8220;information asymmetry,&#8221; where vendors know their product and its strengths and weaknesses, but buyers don&#8217;t have the time or information to understand all their options.<\/p>\n\n\n\n<p>&#8220;This information asymmetry is the classic market for lemons, as described by George Akerlof in 1970,&#8221; said Hubback. &#8220;A vendor knows a lot more about the quality of the product than the buyer so the vendor is not incentivized to bring high-quality products to market because buyers can&#8217;t properly evaluate what they&#8217;re buying.&#8221;<\/p>\n\n\n\n<p>Panelist Greg Rattway, a former JP Morgan Chase managing director and co-founder of cyber risk management firm Next Peak, took issue with the term &#8220;lemons.&#8221;<\/p>\n\n\n\n<p>&#8220;Vendors are not trying to develop lemons,&#8221; Rattway said, &#8220;but the challenge is trying to develop a tool that will do the things that marketing says you have to market aggressively, and therefore the claims for the tools and the technologies are so dramatic, but the complexity of the environment almost makes it impossible for development of a single technology or tool that will actually solve problems in a complex environment.&#8221;<\/p>\n\n\n\n<p>Grace Cassy, co-founder of the CyLon cybersecurity startup accelerator, and a number of others agreed that the complexity of IT environments makes the challenge for product development teams &#8211; and buyers &#8211; even greater.<\/p>\n\n\n\n<p>&#8220;It&#8217;s hard to generalize from a test environment,&#8221; Cassy said. &#8220;What works in a test environment might not in another environment.&#8221;<\/p>\n\n\n\n<p>One audience member said a network of peers can be helpful forbuyers &#8211; but his network discusses use cases a product is effective for rather than generalizing product opinions.<\/p>\n\n\n\n<p>And with marketing and sales budgets far outweighing product development budgets, some said vendors might even welcome pressure from buyers to be less focused on financial results and more focused on product development.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/06\/cybersecurity-information-asymmetry-1024x458.jpg\" alt=\"\" class=\"wp-image-22281\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-1024x458.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-300x134.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-768x344.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-1536x687.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-2048x916.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-150x67.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-696x311.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-1068x478.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-information-asymmetry-1920x859.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Causes of cybersecurity information asymmetry<\/figcaption><\/figure>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/rapid7-insightidr-review\/\">Testing &amp; Evaluating SIEM Systems: A Review of Rapid7 InsightIDR<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Buyers Need to Improve Too<\/h2>\n\n\n\n<p>Two-thirds of the security pros interviewed by Hubback said cybersecurity buyers need to do better too. Part of that is organizing and placing demands on vendors.<\/p>\n\n\n\n<p>To that effect, Hubback, Cassy, Rattway, and University of Oxford government professor Ciaran Martin &#8211; the founding head of the UK National Cyber Security Centre &#8211; discussed efforts to develop the Buyer&#8217;s Charter for SAFER cybersecurity, dubbed &#8220;a vital next step to address the market failings.&#8221;<\/p>\n\n\n\n<p>SAFER stands for:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Symmetry<\/strong>: Fixing the &#8220;symmetry of information&#8221; problem<\/li><li><strong>Assessments<\/strong>: Developing transparent assessments<\/li><li><strong>Freedom<\/strong> that allows for maintaining innovation and new market entrants<\/li><li><strong>Efficacy<\/strong>: Developing a framework for defining efficacy<\/li><li><strong>Risk-based decision-making<\/strong>: Bringing all those aspects together to allow for better decisions<\/li><\/ul>\n\n\n\n<p>Hubback said the group is essentially proposing something similar to GSMA&#8217;s role in setting telecom standards, &#8220;a demonstration of ability.&#8221; He invited RSA attendees to join the group&#8217;s efforts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/06\/SAFER-cybersecurity-charter-1024x477.jpg\" alt=\"\" class=\"wp-image-22279\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-1024x477.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-300x140.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-768x358.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-1536x716.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-2048x955.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-150x70.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-696x325.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-1068x498.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/SAFER-cybersecurity-charter-1920x895.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">Top Cybersecurity Companies for 2022<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defining Cybersecurity Product Efficacy<\/h2>\n\n\n\n<p>Hubback said cybersecurity product efficacy depends on four things: capability, practicality, quality and provenance.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Capability<\/strong>: Does this technology have the capability to deliver what was promised and can the effectiveness be demonstrated?<\/li><li><strong>Practicality<\/strong>: As Hubback put it, &#8220;Is this actually something I can use in my company without needing some kind of Top Gun pilot to fly it and make it work?&#8221;<\/li><li><strong>Quality<\/strong>: How well designed and built is the solution to avoid vulnerabilities and negative impact?<\/li><li><strong>Provenance<\/strong>: How much security risk is in the vendor and its <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-prevent-software-supply-chain-attacks\/\">supply chain<\/a>, based on how they work and who they are?<\/li><\/ul>\n\n\n\n<p>&#8220;Now clearly there are some efficacy measures like, is it in the Magic Quadrant, or do all the other CISOs who I text say that this works?&#8221; Hubback said.<\/p>\n\n\n\n<p>But he noted: &#8220;As an industry, it&#8217;s quite interesting that we don&#8217;t really have a structured way of doing it today, so this is one of the things we&#8217;re sharing from this research is a proposed view of how to define the efficacy of security technologies.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"377\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/06\/cybersecurity-efficacy-1024x377.jpg\" alt=\"\" class=\"wp-image-22280\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-1024x377.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-300x110.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-768x283.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-1536x566.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-2048x754.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-150x55.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-696x256.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-1068x393.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-efficacy-1920x707.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f9a646106-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f9a646106\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f9a646106\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f9a646106\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f9a646106\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f9a646106\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f9a646106\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>About 90% of security buyers aren&#8217;t getting the efficacy from their products that vendors claim they can deliver, according to a panel at this week&#8217;s RSA Conference that also offered some solutions to begin to fix that problem. Joe Hubback of cyber risk management startup ISTARI led both the panel and the study, which was [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":22282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17,16],"tags":[5199,11190],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[143],"class_list":["post-22278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","category-trends","tag-rsa-conference","tag-security-testing","b2b_audience-awareness-and-consideration","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Most Security Product Buyers Aren&#039;t Getting Promised Results: RSA Panel | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"90% of security product buyers aren&#039;t getting the results they were promised. Here&#039;s why - and some possible solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Most Security Product Buyers Aren&#039;t Getting Promised Results: RSA Panel | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"90% of security product buyers aren&#039;t getting the results they were promised. Here&#039;s why - and some possible solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-10T16:17:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T16:17:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Most Security Product Buyers Aren&#8217;t Getting Promised Results: RSA Panel\",\"datePublished\":\"2022-06-10T16:17:09+00:00\",\"dateModified\":\"2022-06-10T16:17:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"keywords\":[\"RSA Conference\",\"Security Testing\"],\"articleSection\":[\"Products\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\",\"name\":\"Most Security Product Buyers Aren't Getting Promised Results: RSA Panel | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"datePublished\":\"2022-06-10T16:17:09+00:00\",\"dateModified\":\"2022-06-10T16:17:11+00:00\",\"description\":\"90% of security product buyers aren't getting the results they were promised. Here's why - and some possible solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg\",\"width\":800,\"height\":618,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Most Security Product Buyers Aren&#8217;t Getting Promised Results: RSA Panel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Most Security Product Buyers Aren't Getting Promised Results: RSA Panel | eSecurity Planet","description":"90% of security product buyers aren't getting the results they were promised. Here's why - and some possible solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/","og_locale":"en_US","og_type":"article","og_title":"Most Security Product Buyers Aren't Getting Promised Results: RSA Panel | eSecurity Planet","og_description":"90% of security product buyers aren't getting the results they were promised. Here's why - and some possible solutions.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/","og_site_name":"eSecurity Planet","article_published_time":"2022-06-10T16:17:09+00:00","article_modified_time":"2022-06-10T16:17:11+00:00","og_image":[{"width":800,"height":618,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Most Security Product Buyers Aren&#8217;t Getting Promised Results: RSA Panel","datePublished":"2022-06-10T16:17:09+00:00","dateModified":"2022-06-10T16:17:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/"},"wordCount":934,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","keywords":["RSA Conference","Security Testing"],"articleSection":["Products","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/","url":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/","name":"Most Security Product Buyers Aren't Getting Promised Results: RSA Panel | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","datePublished":"2022-06-10T16:17:09+00:00","dateModified":"2022-06-10T16:17:11+00:00","description":"90% of security product buyers aren't getting the results they were promised. Here's why - and some possible solutions.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/cybersecurity-broken-link.jpg","width":800,"height":618,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Most Security Product Buyers Aren&#8217;t Getting Promised Results: RSA Panel"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22278"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22278"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22282"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22278"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22278"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22278"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}