Don't Just Turn It On


Most businesses do a pretty thorough job of planning and researching their security purchases, but often overlooked is the planning and budgeting for the operationalization of the new security purchase



Most businesses do a pretty thorough job of planning and researching their security purchases. These processes often take 9–18 months of planning from start to finish. They usually include gathering of specific business requirements, compliance requirements, long term forecasts (for growth), analysis of existing security investments, potential vendor analysis, triplicate quotes, and proof of concepts.

Often overlooked is the planning and budgeting for the operationalization of the new security purchase. This should include more than what it takes to “turn it on.” It should include the time, resources, and headcount necessary for complete configuration, deployment, and customization to achieve the security outcomes that are commonly used to make the business case for the purchase to begin with. Not only does this oversight often lead to “shelfware” or “default-ware,” but it can create budget over-run and impact authorization for future security purchases. 

To avoid this problem, start gathering the following information as soon as possible: 

photo credit: Technologic via photopin (license)

Alert Logic has more than a decade of experience pioneering and refining cloud solutions that are secure, flexible and designed to work with hosting and cloud service providers. We deliver a complete solution that lives in the cloud, but is rooted in real expertise.
CONTACT
Bob Layton
bob.layton@alertlogic.com
713.822.2710
  Company Website
  Facebook
  Linkedin
  Company Blog
  YouTube
  Newsletter
  Google +