Logo

Your security stack might be your biggest vulnerability

By Michael Vallas, Global Technical Principal, Goldilock Secure.

  • Friday, 10th April 2026 Posted 1 hour ago in by Sophie Milburn

Ask any reseller or MSSP what their solution stack looks like right now, and brace yourself. They will explain dozens of overlapping tools, each with their own configurations, dashboards, logic and alerts. They all promise next-gen protection, yet few of them align or talk fluently to each other. 

That's less a seamless security posture and more of an emerging pressure cooker when the chips are down.

Industry experts talk of tool fatigue as one of the biggest barriers to effective security. IBM research shows that organisations now manage, on average, more than 80 different security tools across nearly 30 vendors, creating fragmented visibility and making it harder to uniformly prioritise and respond to today's threats.

More tools, less clarity, different pressures

Security stacks have grown organically over time. As new threat classes emerge, new tools are added. When another threat vector appears, another layer follows, and so on. On their own, each solution may address a problem space, but collectively, they often just create new ones. 

The reasoning is good, but the result can be too many alerts, too many dashboards, too many points of misalignment.

This puts channel partners in a challenging position. As the threat landscape continues to expand, it remains hard to continuously deliver clear security outcomes from widening solution stacks.  When the tools signal a clear need for action, that action must come fast and be specific in the right place. The focus on rapid detection and effective mitigation action gets diverted as teams are left stitching together ever more components to handle the complexity of what to worry about and what to do.

While each solution layer might address a specific risk, they are all software based and by definition could inadvertently hide microscopic blindspots in code or configuration that attackers will exploit through all the traditional methods of corruption, subversion, concealment and impersonation.

The necessary shift to active defence 

Something is shifting in the way the channel is building solutions. Rather than continuing to layer additional tools onto already saturated environments, forward-looking partners are beginning to rethink the stack itself.

The focus is moving toward what might be described as active defence, where the priority isn’t just visibility, but the ability to act instantly and decisively when something goes wrong. The key to this is to rapidly understand the threat level justification to act, to close down an asset or segment to either validate it is clean or identify the threat and neutralise it.   

With AI-driven attacks operating at machine speed, organisations are embracing an “assumed breach” mindset. While the philosophy accepts compromise as inevitable, the focus should also be on keeping the attack surface as small as possible and turning breaches into containable incidents.  The leverage of advanced cyber tools is then all about rapid resolution within a contained zone.

In practice, this means cutting complexity: fewer tools, tighter integration and fewer moving parts. It also means bringing physical controls back into play, enforcing hard boundaries and instantly isolating critical assets.

Unlike software-based segmentation, a physical layer can't be bypassed by compromised credentials, zero-day exploits or misconfigured policies. By selectively connecting and reconnecting critical assets at the right time and in the right places, organisations can regain control over risk without major disruption to their day-to-day operations. 

This is not to say digital defences should be abandoned. Rather, they should be enhanced and targeted, with ground-up resilience that remains effective even when the software layer has been compromised to some degree. 

Regulation is reinforcing the change

Frameworks such as NIS2 in the EU, the UK’s Cyber Security & Resilience Bill and DORA in the financial sector are all placing greater emphasis on resilience and containment. The expectation is no longer just that threats are detected, but that organisations can demonstrate a breach in one area won’t cascade out across the network. 

In other words, organisations must demonstrate control, not just visibility. That’s a very different requirement, and one that complex, loosely integrated stacks have a hard time meeting. 

For channel partners, this creates both pressure and opportunity. Customers are increasingly looking for advice and solutions that clearly define how to manage and reduce risk. The new “must have” is the ability to streamline architectures and physically separate systems from the network, which reduces exposure by keeping critical assets outside the view of attackers without disrupting business continuity.

It also changes what partners can grow as value propositions. Customers are less interested in buying another layer of tooling and more focused on buying the outcomes they need to present to the Board.  Such as how quickly a threat can be contained and how clearly any disruption’s blast radius can be limited. That shift towards measurable protection is redefining what solid security looks like.

A strong future through simplicity

The next phase of growth in the channel won’t come from adding more layers, but from giving the ones in place a more powerful purpose.

Partners who succeed will be those helping customers gain faster and more powerful attack control by rationalising their stacks and focusing on what actually improves their business operating security. This means prioritising clarity of action over coverage of marginal concerns and self-inflicted complexity. 

The ultimate change is in how partners position themselves. Instead of selling another tool, the conversation becomes simpler and more outcome-focused: how to build stronger businesses that can handle the future of cyber defence needs.

By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
By Scott Ashenden, Head of Security and Infrastructure at Team Matrix.
By Simone Larsson, Head of Enterprise AI, EMEA, Lenovo.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Rick Vanover, Vice President, Product Strategy at Veeam.
By Peter Manta, AI Strategy and Practice Director, Informatica by Salesforce.