{"id":7201,"date":"2014-10-31T12:00:23","date_gmt":"2014-10-31T19:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7201"},"modified":"2014-10-31T12:20:02","modified_gmt":"2014-10-31T19:20:02","slug":"the-conga-line-security-vendor-solutions-has-grown-too-long","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/the-conga-line-security-vendor-solutions-has-grown-too-long\/","title":{"rendered":"\"The Conga Line of Security Vendor Solutions Has Grown Too Long\""},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/10\/ismg-advanced-persistent-threats-survey\/\" target=\"_blank\"><strong>ISMG\u2019s recent 2014 Advanced Persistent Threats Survey<\/strong><\/a>, sponsored by Palo Alto Networks, features an interview with\u00a0our CSO Rick Howard\u00a0on \"How to Put Survey Results to Work,\" where he talks candidly about his gut reaction to the survey results, the latest APT tactics and solutions, and how organizations should approach 2015 security investments.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7204 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote-500x157.png\" alt=\"Rick quote\" width=\"500\" height=\"157\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote-500x157.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote-510x161.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote-126x40.png 126w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Rick-quote.png 535w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/connect.paloaltonetworks.com\/apts-survey-report\" target=\"_blank\">Download the report here<\/a> to read\u00a0the\u00a0full interview between ISMG\u2019s Tom Field\u00a0and Rick Howard.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISMG\u2019s recent 2014 Advanced Persistent Threats Survey, sponsored by Palo Alto Networks, features an interview with\u00a0our CSO Rick Howard\u00a0on \"How to Put Survey Results to Work,\" where he talks candidly about his &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,112,108],"tags":[867,793],"coauthors":[709],"class_list":["post-7201","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-interview","category-threat-prevention-2","tag-advanced-persistent-threats","tag-ismg"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7201"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7201\/revisions"}],"predecessor-version":[{"id":7212,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7201\/revisions\/7212"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7201"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}