Niels Hoekman’s Post

Let’s look at the vendors many enterprises rely on today: • Palo Alto Networks • Fortinet • Check Point • CrowdStrike • Zscaler I recently looked at public CVE disclosures over the last 5 years across these vendors, and the numbers surprised quite a few people. But there’s an important nuance most people miss: Architecture matters. Some of these vendors historically built their platforms around: • Hardware appliances • On-prem software • Customer-managed infrastructure Think traditional firewall and network security platforms. That model naturally introduces: - More exposed services - More patch management - More upgrade cycles - And inevitably more potential CVEs Other vendors were built cloud-native from day one. Fully SaaS-native security platforms work very differently. When security is delivered 100% SaaS: • No appliances to maintain • No on-prem management layer • Patching happens centrally in the provider’s cloud • The public attack surface is significantly smaller Less exposed infrastructure → less opportunity for publicly disclosed vulnerabilities. Important nuance: More CVEs does NOT automatically mean worse security. It can also reflect: • A larger product portfolio • Greater transparency in vulnerability disclosure • A bigger global installed base Organizations like CISA also play an important role here. They maintain the Known Exploited Vulnerabilities (KEV) catalog and provide guidance on which vendor vulnerabilities organizations should prioritize and remediate first. So CVE counts alone never tell the full story. But they do raise an interesting question: If security vendors build products to protect others… how secure are the vendors themselves? Curious to hear the community’s perspective

  • graphical user interface
Nick Adams

Asure Software3K followers

2w

Why is 225 above 400?

Miguel Minicz

Cato Networks19K followers

2w

Interesting information. And I've been talking about it A LOT recently... and my question is: "Why are people still buying it?" I'd like to see a second level of this graph showing the proportion of higher-severity CVEs versus the total... My feeling is that Palo Alto and Fortinet will still be leading... by far. One correction: the proportion of the bars... following Zscaler's CVEs count (and 8 is still way too much), the Fortinet bar would be reaching out the building down the road...

Dan Griffin

Horizon3.ai2K followers

2w

intersting take, CVEs happen as a result of innovation and pushing code, Microsoft and Cisco have published thousands of CVEs over the last 5 years, with Microsoft leading at over 1,800 and Cisco around 350 Both of which will claim to be security companies also CVEs are only a small part part of any story and most amount to nothing when organisation have in depth strategy, i mean who cares if you can exploit my do-hicky when there is no service or data that can be impacted as a result of that exploit, while CVEs exist, folks meed to understand 1. isnit exploitable, 2. what is the impact of that, 3. what is the onward exposure that leads to number of CVEs is just a binary number, the average organisation takes over 190 days to patch one

Cedric Lochouarn

Palo Alto Networks11K followers

2w

HI how do you analyse this chart? What s the criticity of vulns? How can you compare a rough number without comparing thie criticity, time to remediate and number of products / lines of code... It would be like saying that there are more stairs from ground floor to the top of Burj Kalifa than to escalate the eiffel tower which is 3 time smaller. Judt my 2 cent, i m just a sales guy...

Gecko Conneto

Freelance30 followers

2w

Niels Hoekman this comparison is fundamentally flawed. CVE counts between customer-deployed software and SaaS platforms are not comparable. When software runs in customer environments, vulnerabilities must be disclosed so customers can patch them → CVEs get issued. In SaaS, the vendor can patch silently in their backend and no CVE is ever created. So fewer CVEs often means less visibility, not fewer vulnerabilities. The “smaller attack surface” claim is also misleading. SaaS doesn’t remove risk — it centralizes it. Compromise an appliance → one organization affected. Compromise a SaaS security platform → potentially thousands of tenants impacted simultaneously. SaaS can absolutely improve operational hygiene and patch speed, which is valuable. But arguing it is inherently safer because it produces fewer CVEs is a category mistake. It mostly reflects how disclosure works, not how secure the systems actually are.

Jack Godfrey

Check Point Software…2K followers

2w

What's the source of this data? Moti Sagey מוטי שגיא

Tony Jenkins

SafeGuardian2K followers

2w

Niels Hoekman maybe also balance this post with a time to remediate chart.

Munish Sidana

Brenntag2K followers

2w

Every product has and will have vulnerabilities. But I have other thought, more vulnerabilities does tell something about internal development and testing processes, especially the consistent severity of reported vulnerabilities. Vendors do have teams that perform bug scrubbing. But also from business perpective, these devices would can become operational overhead.

Tommy Brashares

MONARCH Contol Systems420 followers

2w

MONARCH Control is the answer

See more comments

To view or add a comment, sign in

Explore content categories