Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.
When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends.
Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks.
One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could enforce this order, but what was actually happening is...