The study revealed that 74% of UK businesses rely on multi-vendor ecosystems, which often increase operational risks and contribute to staff burnout. Over a third (36%) of cybersecurity professionals described their tech stacks as overly complex and time-consuming, making it harder to address evolving threats.

This fragmented approach to cybersecurity tools is creating serious operational bottlenecks. Compatibility issues, cited by 43% of respondents, are making it difficult to maintain consistent security processes due to poor cross-platform integration. As a result, teams are forced into manual interventions, which not only slow down response times but also elevate the risk of human error and security breaches.

A lack of unified visibility was another concern. Thirty-six percent of those surveyed admitted struggling with inconsistent threat detection due to the wide range of tools in use, which often leads to blind spots and reduced situational awareness.

Ilya Markelov, head of the unified platform product line at Kaspersky, noted that many organizations adopt multiple vendors by default rather than through strategic planning. While having diverse solutions can reduce certain risks, he warned that unchecked tool sprawl drains resources and leads to critical visibility gaps.

Tool sprawl isn’t unique to cybersecurity. A previous report by Red Canary in October 2024 highlighted similar concerns among software developers, while IDC research identified “context switching” — shifting between multiple toolsets — as a major productivity killer. Seventy percent of workers surveyed said frequent switching between platforms reduced their efficiency.

Kaspersky’s report also raised the financial implications of this trend. Thirty-six percent of UK businesses reported budget overruns due to redundant or overlapping security tools. The firm stressed that such inefficiencies complicate both resource allocation and long-term planning.

Stay ahead of emerging cybersecurity threats. For the latest insights and updates on cloud security, follow SOC News.

News Source: ITPro.com