In order to achieve optimal cybersecurity, you have to master many challenges. Find out here how agile operation of vendors and technologies can help you with it.


The main task of cyber security is the reliable detection and elimination of threats. The particular challenge is the daily growth of hundreds of thousands of new threats. How can the agile use of vendors help me to protect myself from this?

Businessman Icon

By using a single vendor, you have its individual security potential at your disposal. This decides whether a threat is detected or not. Whether EPP or EDR, signatures or artificial intelligence, the resulting detection rate is always subject to fluctuations, which means that many, but not all, threats can be detected. Neutral test institutes such as AV-Comparatives, AV-Test, VirusBulletin or ICSA-Labs continuously prove this.

Multi-Vendor Malware Detection
Business Men Icon

Agile cybersecurity allows you the flexible combination of independent vendors. By overlapping the different security potentials, missing detections can be compensated for, existing ones confirmed, and the overall detection rate can thus be maximized. All technical approaches can be used for the combination, which can make their contribution equally. Behavior monitoring and artificial intelligence are no exception.


False alarms (false positives) are an unpleasant side effect of threat detection. Harmless files or legitimate behavior are mistakenly considered a threat. The consequences range from unnecessary extra work for administrators to computer crashes and data loss. How can agile cybersecurity help me deal with false alarms?

Businessman Icon

Any technical approach, including behavior-based surveillance and artificial intelligence, can cause false alarms. When using a single provider, you therefore have to rely on their quality assurance, check identified threats for a possible false positive and, if necessary, create exceptions to remedy them.

False-Positive Protection
Business Men Icon

The simultaneous use of independent vendors enables you to deal with false alarms in a new way. You can make automatic responses to detected threats, which could cause potential harm, depend on the agreement of several vendors. In addition, the consolidation of the various threat information helps you to decide at a glance whether it can be a false positive or not.


When it comes to the detection of new types of threats (Zero-Days), the period of time until protection is available is crucial. How do I make sure that this period is as short as possible to avoid damage?

Businessman Icon

The time to protection against a new threat can vary from case to case and from vendor to vendor. With the use of a single vendor, protection is therefore sometimes immediately available to you, in other cases your vendor must make adjustments beforehand (re-training of the AI, adjustment of the behavior analysis, delivery of an update). As a result, your risk period can range from hours to days.

Protection Response Times
Business Men Icon

Through the combined use of vendors, protection against new threats is always available to you by the fastest vendor you use. Agile cyber security can therefore help you to significantly reduce your average exposure period.


The implementation of a security system is the basis for cybersecurity and a multi-stage process. After some time, this must be repeated again and again, for a variety of reasons (e.g. dissatisfaction with the existing provider, changed requirements, strategic decisions). How does agile cybersecurity affect this?

Businessman Icon

The traditional implementation process consists of the following stages: The solutions in question must be installed and evaluated individually in order to select a single vendor. Based on its features, a concept for use must then be developed, the solution including the software roll-out implemented and the administrators re-trained. The total effort for this project can be weeks or months.

Free Vendor Choice
Business Men Icon

As soon as the base system for agile operation has been put in place, the implementation process changes fundamentally. Vendors in question can be activated on click and tested immediately. The choice does not even have to fall on a single vendor, but can be a combination of various ones. Further steps such as concept development, implementation and re-training are not necessary, since the base system is already in place and does not change due to the activation of vendors. The total effort for this project can therefore be a few hours.


In a company, different systems can have different requirements to a security system. For example, a file server that has to process a large number of simultaneous accesses has other needs than mobile devices, that can leave the protection of the company. How do I deal with this challenge?

Businessman Icon

If a single vendor is used, it must be able to cover all required areas of application equally. By modifying its configuration, there is a little leeway so that you can adapt it to the task at hand.

Corporate Environment
Business Men Icon

With agile cybersecurity, you can address each area of application individually. Activate those vendors in those combinations whose technology characteristics fit the task perfectly. For example, high data throughput technologies for file servers and several different security technologies for mobile devices. This gives you optimal compatibility for every application.


IT and the threat landscape are constantly changing. Therefore, cybersecurity has to constantly adapt to new circumstances. How fast and flexible am I to make changes?

Businessman Icon

Depending on the vendor used and its features, you can make certain changes to the configuration or install additional products. If that is not enough, a re-implementation project is necessary to switch to another vendor that can meet the new requirements. This may be repeated several times.

Hot Swap Changes
Business Men Icon

With agile cybersecurity, you can make changes by click. Whether a change of vendor or the introduction of a new, technological approach, there are no limits to the possibilities. The desired changes are implemented via hot swap, in the common system, during operation, without a restart or the need for a new software roll-out.


Which strategy I follow for my cybersecurity can be crucial to protect myself from all threats and to achieve optimal compatibility with my IT. What scope do I have with it?

Businessman Icon

Depending on the vendor used, the options may differ somewhat. However, the use of a single vendor limits the design freedom to the optional use of its functions and the creation of scheduled tasks.

Agile Security Strategies
Business Men Icon

Agile cybersecurity opens up a new dimension of security strategies. Due to the flexible use of vendors, new criteria for designing the strategy are available: Which vendors, in which combinations, with which technologies, on which devices, at what point in time should be activated?


When protecting IT, emergencies can occasionally happen. These usually occur when the security vendor used does not detect a threat and a virus outbreak begins. What options do I have in such a situation?

Businessman Icon

If your vendor does not detect a threat, you have to, if possible, research the symptoms and create manual blocking rules. Alternatively, you can download a cleaning tool (e.g. emergency CD) from another vendor and use it to manually clean your devices.

Security Incident Handling
Business Men Icon

If none of the active vendors detects the threat, you can immediately use agile cybersecurity to call for help from another vendor who has the necessary detection. Activation can happen within a few minutes, across the network, to stop the outbreak.


Depending on which requirements exist for my company, I have to implement measures to ensure compliance. There is increasing demand for multi-vendor strategies. How do I implement this?

Businessman Icon

With single vendors, you can set up pseudo multi-vendor strategies. For this, one vendor is used in different areas (e.g. vendor A for servers and vendor B for clients). Alternatively, you can try to find compatible vendors that can be operated simultaneously on the same device for different functions. In any case, however, this results in twice the operating effort and only a slight improvement in security.

IT Security Compliance
Business Men Icon

Agile cybersecurity allows you to implement a real multi-vendor strategy. You can activate several vendors on one device and combine them flexibly. The uniform base system eliminates the need for double maintenance and the overlapping of the security technologies ensures a significant improvement in security. This means that you can met the compliance requirements perfectly, with little effort.


What are the consequences if I want to use multiple vendors for my cybersecurity? How big are the daily maintenance and operating expenses?

Businessman Icon

With the use of several individual vendors, your effort increases with each additional vendor. This includes the implementation effort, the ongoing maintenance effort (e.g. importing updates and patches per vendor), as well as the daily operating expenses (e.g. control of reports and dashboards per vendor).

United Endpoint Protector
Business Men Icon

Thanks to the uniform base system of agile cybersecurity, the implementation, maintenance and operating expenses correspond to those of a single vendor. The number of activated vendors within the system is irrelevant and the consolidation of the threat data means that you always have an overview of all information across vendors.

Test the United Malware Protection

now for free!

Register Now