{"id":47601,"date":"2022-07-20T22:03:59","date_gmt":"2022-07-20T22:03:59","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration"},"modified":"2022-07-20T22:03:59","modified_gmt":"2022-07-20T22:03:59","slug":"cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/","title":{"rendered":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>EWTON, Mass. &amp; VIENNA, Va.&#8211;(<a referrerpolicy=\"unsafe-url\" rel=\"nofollow\" itemprop=\"url\" href=\"https:\/\/www.businesswire.com\/\">BUSINESS WIRE<\/a>)&#8211;Driven by security operations complexity, nearly half (46%) of organizations are consolidating or plan on consolidating the number of vendors they do business with. As a result of this drive toward security technology consolidation, 77% of infosec pros would like to see more industry cooperation and support for open standards promoting interoperability. As thousands of cybersecurity technology vendors compete against each other across numerous security product categories, organizations are aiming to optimize <em>all<\/em> security technologies in their stack at once, and vendors that support open standards for technology integration will be best positioned to meet this change in the industry, according to a new annual global study of cybersecurity professionals by the <a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.issa.org%2F&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=Information+Systems+Security+Association+%28ISSA%29&amp;index=1&amp;md5=a3946e0e62923531320a831d02116526\" rel=\"nofollow noopener\" shape=\"rect\">Information Systems Security Association (ISSA)<\/a> and independent industry analyst firm <a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.esg-global.com%2F&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=Enterprise+Strategy+Group+%28ESG%29&amp;index=2&amp;md5=8196b8c42965e0cffd718fe35edb61f5\" rel=\"nofollow noopener\" shape=\"rect\">Enterprise Strategy Group (ESG)<\/a>.<\/p>\n<p>The new research report, <em>Technology Perspectives from Cybersecurity Professional<\/em>s, surveyed 280 cybersecurity professionals, which were primarily ISSA members, focused on security processes and technologies and revealed that 83% of security professionals believe that future technology interoperability depends upon established industry standards. The report shows a cybersecurity landscape that looks favorably towards security product suites (or platforms) as it moves away from a defense-in-depth strategy based on deploying best-of-breed cybersecurity products; a historical precedent that has steadily increased organizational complexity and contributed to substantial operations overhead.<\/p>\n<p><strong>From Best-of-Breed to Integrated Platforms<\/strong><\/p>\n<p>Security professionals have long believed that purchasing best-of-breed products provided the best overall defense-in-depth. However, as the number of security products has skyrocketed, many organizations manage 25 or more independent security tools\u2014an approach that comes with substantial operations overhead.<\/p>\n<p>Security professionals identified numerous problems associated with managing an assortment of security products from different vendors such as increased training requirements, difficulty getting a holistic picture of security, and the need for manual intervention to fill the gaps between products. As a result of these issues, 21% of organizations are consolidating the number of vendors they do business with and 25% are considering consolidating.<\/p>\n<p><strong>Most common reasons for vendor consolidation<\/strong><\/p>\n<ul>\n<li>Operational efficiencies realized by security and IT teams (65%)<\/li>\n<li>Tighter integration between previously disparate security controls (60%)<\/li>\n<li>Improved threat detection efficiency (i.e., accurate high-fidelity alerts, better cyber-risk identification, etc.) (51%)<\/li>\n<\/ul>\n<p>In addition:<\/p>\n<ul>\n<li>53% tend to purchase or will in the future purchase security technology platforms rather than best-of-breed products<\/li>\n<li>84% believe that a product\u2019s integration capabilities are important and 86% of respondents say it is either critical or important that best-of-breed products are built for integration with other products<\/li>\n<li>After cost (46%), product integration capabilities are the most important security product consideration for 37% of security professionals<\/li>\n<\/ul>\n<p><strong>Evaluating \u201centerprise-class\u201d security vendors<\/strong>\n<\/p>\n<p>As the security technology market consolidates, \u201ccenters of gravity\u201d will become established around a few large vendors and affect future buying strategies; organizations will place more bets on fewer security technology vendors. According to cybersecurity professionals, the most important attributes for an enterprise-class cybersecurity vendor are:<\/p>\n<ul>\n<li>A proven track record of executing its cybersecurity product roadmap and strategy (34%)<\/li>\n<li>Provides products designed for enterprise-scale, integration, and business process requirements (33%)<\/li>\n<li>Commitment to reducing operational complexity, lowering cost of ownership (31%)<\/li>\n<\/ul>\n<p>\u201cGiven that nearly three-fourths (73%) of cybersecurity professionals feel that vendors engage in hype over substance, the vendors that demonstrate a genuine commitment towards supporting open standards will be best positioned to survive the industry-wide consolidation taking place,\u201d said Candy Alexander, Board President, ISSA International. \u201cCISOs have been so overburdened with vendor noise and dealing with security \u2018tool sprawl\u2019 that for many a wave of vendor consolidation is like a breath of fresh air.\u201d\n<\/p>\n<p>\u201cThe report reveals a massive change taking place within the industry, one that for many feels like a long time coming,\u201d said Jon Oltsik, Senior Principal Analyst and ESG Fellow. \u201cThe fact that 36% of organizations might be willing to buy most security technologies from a single vendor speaks volumes to the shift in purchasing behavior as CISOs are openly considering security platforms in lieu of best-of-breed point tools.\u201d<\/p>\n<p>After reviewing this data, ESG and ISSA recommend that organizations push their security vendors to adopt open industry standards, possibly in cooperation with industry ISACs. There are a few established security standards from MITRE, OASIS, and the Open Cybersecurity Alliance (OCA), available, and while many vendors speak favorably of open standards, most do not actively participate or contribute to them.<\/p>\n<p>This lukewarm behavior could change quickly, however, if cybersecurity professionals\u2014especially those at organizations large enough to send a signal to the market\u2014establish best practices for vendor qualification with process requirements that include adopting and developing open standards for technology integration as part of the comprehensive process for all security technology procurement.<\/p>\n<p>The full report can be downloaded <a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.issa.org%2Fwp-content%2Fuploads%2F2022%2F07%2FESG-ISSA-Research-Report-Security-Process-and-Technology-Trends-Jul-2022.pdf&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=here&amp;index=3&amp;md5=1a2117579dd5ee379950a34017a88ef3\" rel=\"nofollow noopener\" shape=\"rect\">here<\/a>.<\/p>\n<p><strong>About ESG<\/strong><\/p>\n<p><a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.esg-global.com%2F&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=Enterprise+Strategy+Group+%28ESG%29&amp;index=4&amp;md5=71c448d88ff868f5e6035775be1f2154\" rel=\"nofollow noopener\" shape=\"rect\">Enterprise Strategy Group (ESG)<\/a> is an integrated technology analysis, research, and strategy firm providing market intelligence, actionable insight, and go-to-market content services to the global technology community. It is increasingly recognized as one of the world\u2019s leading analyst firms in helping technology vendors make strategic decisions across their go-to-market programs through factual, peer-based research. ESG is a division of TechTarget, Inc. (Nasdaq: TTGT), the global leader in purchase intent-driven marketing and sales services focused on delivering business impact for enterprise technology companies.<\/p>\n<p><strong>About ISSA<\/strong><\/p>\n<p>The Information Systems Security Association (ISSA)\u2122 is the community of choice for international cyber security professionals dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure. ISSA members and award winners include many of the industry\u2019s notable luminaries and represent a broad range of industries \u2013 from communications, education, healthcare, manufacturing, financial and consulting to IT \u2013 as well as federal, state and local government departments and agencies. Through regional chapter meetings, conferences, networking events and content, members tap into a wealth of shared knowledge and expertise. Follow us on Twitter at <a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Ftwitter.com%2Fissaintl&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=%40ISSAINTL&amp;index=5&amp;md5=1dbc3d66a2ffa355421f600463ee8cfb\" rel=\"nofollow noopener\" shape=\"rect\">@ISSAINTL<\/a>. Learn more about <a referrerpolicy=\"unsafe-url\" target=\"_blank\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.issa.org%2F&amp;esheet=52786081&amp;newsitemid=20220720005341&amp;lan=en-US&amp;anchor=ISSA&amp;index=6&amp;md5=d2c7fb498c819f954d56239f34dd8607\" rel=\"nofollow noopener\" shape=\"rect\">ISSA<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New global study from ESG and ISSA reveals nearly half of organizations are consolidating or plan on consolidating the number of vendors they do business withRead More <a href=\"https:\/\/www.darkreading.com\/cloud\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47601","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-20T22:03:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration\",\"datePublished\":\"2022-07-20T22:03:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/\"},\"wordCount\":961,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/\",\"name\":\"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2022-07-20T22:03:59+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-20T22:03:59+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration","datePublished":"2022-07-20T22:03:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/"},"wordCount":961,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/","url":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/","name":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2022-07-20T22:03:59+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybersecurity-professionals-push-their-organizations-toward-vendor-consolidation-and-product-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47601"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47601\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}