Go back

More Tools, More Problems?

Too many security tools generate as much additional work as they do alerts: the best reduce both risk and toil.

Industry Insights
September 3, 2025
4m read
4m read
4m listen
4m watch
4m watch
More Tools, More Problems HeaderMore Tools, More Problems Thumbnail
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

Too many security tools generate as much additional work as they do alerts: the best reduce both risk and toil.

I came across a thread on r/cybersecurity the other day that really struck a nerve. The original post hit on a statistic brought up at M365 in New York that organizations with 12 or more tools in their security stack were seeing nearly three times as many incidents as others. 

The discussion in that thread covered the expected range of opinions, and it hit home with me, because the underlying issues are among the core problems that we’re trying to solve here at Material.

Spoiled for choice

The end goal of adding new tools to your security stack is, obviously, to protect your environment somehow: to detect more threats, harden your posture, give your team more visibility, or some combination thereof. 

We’ve got no shortage of options for tools in the security industry. We’ve all seen some variation of the security vendor landscape map, and they’re all seeing-eye charts of tiny logos floating in a sea of vendors. 

There’s a reason all those vendors exist and so many of them not only stay in business but thrive: because most of them are at least pretty good at what they do. They detect the threats, misconfigurations, vulnerabilities, and other risks lurking in your environment. And if you choose your new tools with at least some degree of competence, each new tool will find problems that your existing toolset couldn’t… otherwise, why buy the tool.

But where so many security tools miss the mark is that while they may be great at finding problems, many (most?) are not so great at helping you fix them. 

Visibility isn’t the enemy

When you add a new tool to your stack and suddenly see more incidents and alerts, it’s not because your environment suddenly got riskier: it’s because you’re shining light on things you couldn’t see before. That’s a good thing. Nobody wants to be flying blind. 

But visibility alone doesn’t make your life easier. In fact, it usually makes it harder because now you’re buried under another feed of alerts, another dashboard, and another pile of “maybe bad” signals to sort through.

Shiny new tool, terrifying new workload

If you’ve ever trialed a tool that bragged about “catching everything,” you know what happens next: your team spends half the day chasing false positives, manually correlating signals, and reconciling dashboards. Some email security and SaaS tools are especially guilty of this — they flood you with “detections” that look impressive in a demo but turn into chores in production.

That’s not security. That’s overhead. The end result is that your new tool detected a bunch of new problems that existed before, but you were blissfully ignorant of. Now, they’re a new problem to solve.

And this is where skeptics of point solutions and buying a slew of best-in-breed products have a bit of a point: too many detection tools flood you with alerts. That now-old joke that the “R” is silent in most “detection and response” tools exists for a reason and still rings true today. Every “AI-powered” inbox filter or “next-gen” anomaly detector loves to hand you a dashboard of possible problems.

There’s a certain saturation point where too many signals–even strong, valid ones–become noise in and of themselves. Particularly for lean security teams, being buried in blinking red lights doesn’t solve the problems you’re suddenly detecting. You burn cycles chasing false positives, reconciling dashboards, and manually triaging junk. Which, not coincidentally, is how a lot of so-called email security platforms end up being more pain than protection.

The right way forward

The reality is there’s no “correct” number of tools in your stack, obviously. Every organization is different, with different needs and security teams of different sizes and specialties. 

The number of tools you’re using doesn’t matter, what matters is whether a tool:

  • Closes a blind spot left by your other tools that actually matters
  • Automates as much work as realistically possible
  • Gives you a clear outcome instead of another “insight” to babysit

If a tool can’t check at least two of those boxes… is it really worth it? 

I’ve seen this dynamic play out across different parts of the industry. Teams add tools because they want to be safer–and in many cases they get the visibility they need. But far too often, the tools can’t effectively operationalize the information they provide.

What separates the products that last from the ones that get ripped out is usually pretty simple: they reduce risk and reduce toil. 

That’s the north star in my work now. The best security tools don’t just tell you what’s wrong, they help you fix it. They give you peace of mind and they give you and your team time back, so you can put that mental energy into pushing your business and your security strategy forward, rather than playing whack-a-mole on yet another console.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New