• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

The Questions You Should Ask Your Software Providers

by CXO Staff
February 8, 2022
in Opinions

David Gardiner at SolarWinds, says every vendor should put in place strong measures to protect themselves and their users in an increasingly dangerous cyber threat landscape

hacking hacker hackers cyber security

Software providers everywhere are under attack by cyber threat actors. Whether it’s a ransomware, the latest zero-day exploit, or a highly sophisticated, well-resourced, and persistent supply chain like SUNBURST, our entire industry faces an increasingly treacherous threat landscape, and nearly every news day brings with it another wave of announcements and urgent system updates to be made. 

As SolarWinds knows better than most, these attacks can be highly sophisticated, well-resourced, and persistent. It’s why initiatives like Secure by Design are so important, and why IT practitioners, executives, and business leaders need to ask more of every software vendor they choose. 

While some vendors may choose to swoop in when a competitor faces an attack, the truth is no one is safe from every threat. The software vendor who took business from others yesterday may very likely be tomorrow’s newest victim. 

What’s most important to remember is any software vendor can be attacked, and every vendor should take additional steps to protect themselves and their users. SolarWinds encourages our customers and prospective customers to ask more of every vendor they consider—including us. 

In response to the SUNBURST cyberattack, we rolled out our Secure by Design initiative, and set out on a journey to become an industry leader in secure software development—and to set new standards in information-sharing and public-private partnerships for the benefit of the broader user community. 

As part of Secure by Design, we created a set of questions IT practitioners, executives, and business leaders should ask of any software vendor they evaluate—including SolarWinds. We believe these questions, together with the answers SolarWinds provides, offers our customers valuable perspective on how they can better prepare themselves to face an inevitable security issue. Because the next attack is always on the horizon. 

Dimensions organisations should evaluate when they consider any software provider, include the following: 

  • What’s their approach to secure software development lifecycle?
  • How do they secure software code and its associated infrastructure?
  • Have they implemented an enterprise risk management (ERM) program, and what is it?
  • When a threat or vulnerability is discovered, what are their processes to notify customers, and do they include possible mitigations?
  • What level of detail do their internal processes provide to identify internal threats?
  • What are their internal processes to validate changes, when they were made, who made them, and why?
  • Do they have an internal hiring screening process sufficient to identify adversarial actors, potential U.S. domestic terrorists, and/or candidates with criminal backgrounds?

We provide answers to all these questions detailing what SolarWinds has implemented in terms of process, standards, and strengthened protections. We believe this is a comprehensive guide for our customers and prospects to measure our readiness to support them—and we encourage them to apply the same rigor to other providers they evaluate, as well. 

Tags: featuredSecure by DesignSolarWinds
ShareTweet

Related Posts

How digital transformation unlocks agility and efficiency for EPC firms 
Industries

How digital transformation unlocks agility and efficiency for EPC firms 

In a world of rising geopolitical tensions and unpredictable politics, the global economy is braced for constant, sudden change. The...

July 10, 2025
Relief and reward: The human-centric case for GenAI in IT operations 
Future

Relief and reward: The human-centric case for GenAI in IT operations 

Across the Middle East, governments and enterprises are pushing ahead with unprecedentedly ambitious AI strategies. From Saudi Arabia’s Saudi Vision...

July 8, 2025

Discussion about this post

Latest Issue

Huawei unveils Pura 80 Series in Dubai

Huawei unveils Pura 80 Series in Dubai

July 11, 2025
data centre green sustainable

Morocco to build renewable energy-powered data centre

July 10, 2025
How managed services are driving enterprise resilience in the UAE

How managed services are driving enterprise resilience in the UAE

July 10, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.