iTnews
  • Home
  • Features
  • Technology
  • Security

The end of 'fear factor' marketing nowhere in sight

By Staff Writers on Nov 12, 2007 3:16PM
The end of 'fear factor' marketing nowhere in sight

The screaming headlines have been running for years. Whether they're in press releases about cybercrime exceeding international drug profits or the billions of dollars lost to breach disclosures or videos highlighting the meltdown of power generators due to a myriad of vulnerabilities, the anti-malware industry has long relied on fear to move their products.

Granted, malware criminals do not wish their business and government victims well, but after a decade of scare mongering, the sight of malware vendors putting on a sheet and saying “boo!” fails to incite excitement.

Fear-factor marketing of anti-malware products is falling flat for a number of reasons. First, as the anti-malware market has matured, product differentiation among vendors has narrowed. Well known anti-malware products from leading vendors all pretty much work the same way — an endpoint client relying on recognised malware signatures to block their execution and propagation — and rely on widely available information sources to discover and ultimately develop counters for new species of malware found in the field.

Market shares among the leading vendors have remained stable for the past few years. These symptomise a market free from any recent technical breakthroughs and where perceived high switching costs dissuade buyers from changing vendors. Vendor lock-in leads to escalating license renewal costs, as renewal pricing always seems to come in a bit lower than switching cost plus the price quoted by the next lowest bidder for the customer's anti-spyware dollars.

The biggest downside of fear factor marketing is that it restricts anti-malware defense to its niche as a low process-effectiveness component of enterprise security and system-management programs. As it stands, IT managers view anti-spyware and anti-virus functions as reactive and potentially disruptive activities that distract them from attaining higher-level business value delivery goals.

The security people in an organisation are always the ones sounding the alarm against the latest threat and demanding immediate remediation to stop it. Dire warnings of this kind run counter to system managers' focus on SLAs, quality of service, availability, return on cost and utilisation.

Beyond the fear factor
For information security to shed its reputation as the disruptors of rational management of IT assets, it needs to replace the event-driven security concept with a risk-management focused approach. In this way, security becomes a manageable cost of doing business, where managers can decide how much time, effort and money to devote to security balanced by perceived risks and returns. This approach requires cool calculation of security costs and benefits.

This may sound strange to a business traditionally focused on catastrophic damage avoidance. After all, it is hard to put a value on things that didn't happen. But the insurance industry has been doing this for hundreds of years in pricing risks as diverse as sinking ships and arthritis afflicting concert pianists.

Refusing to play the fear factor game can prove liberating to IT organisations. It can help align anti-malware defense with other infrastructure management disciplines at the organisation. This can open the door to bringing anti-malware defense up the operational effectiveness ladder from reactive fire-fighting to rationally priced and smoothly delivered service to end-users. Finally, service-oriented anti-malware concepts can turn the tables on vendors, forcing them to re-think their value propositions as well as how and what they charge customers.

Profiting from commoditisation
The maturing anti-malware market, the recognition that its emperors wear undifferentiated clothes and re-valuation of what anti-malware defense brings to an IT program, creates conditions conducive to commoditisation and cost reduction.

If a bracket of anti-malware software competitors offer similar effectiveness, the vendor that combines low price, easy switching from incumbent to alternative products, and the potential for consolidating anti-malware defense with other infrastructure management processes (vulnerability management, access control, software distribution, asset discovery, data leak prevention, security policy enforcement, etc.) will be preferred over other entrants.

Fear factor marketing will continue for at least the next couple of years. Old habits die hard and as real differentiation evaporates, fear factor vendors will amp up their repertoire of ghost stories. Commoditization, however, has an irresistible logic of its own.

Forward thinking IT leaders will learn how to leverage commoditization to do more than to drive harder bargains with vendors. They will see it as a pathway for moving security up the operational maturity pyramid and in doing so, moving the organization to IT value delivery excellence.

- Amrit Williams is chief technology officer of BigFix Inc.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
endfactorfearinmarketingnowhereofsecuritysightthe

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Staff Writers
Nov 12 2007
3:16PM
0 Comments

Related Articles

  • BlackBerry pulls life support for once-indispensable business smartphone
  • Qld gov proposes mandatory data breach reporting for agencies
  • Critical Splunk bug propagates code execution
  • Researchers hacked Oracle servers to demo serious vulnerability
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

The security threat of quantum computing
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.