3 minute read time.
Successful ecosystems constantly adapt, or to say, they constantly add value to existing mechanisms. The standardisation of cyber security models, whether technical or non-technical, have allowed the same adaptation of value add methods.


The cyber landscape of technology is now far more responsive to any cyber-ontologies compared to five years ago. The ability to go to market with a solution is far more simpler, technologies like jboss have created an expectation on how product should intuitively work. More over, enterprise level organisations themselves see this as a default - without even much thought. Historically, an unprecedented cyber-ontology might have required propriety based approach to provide a solution whose costly approach would mean only a select few could implement the technology or subject themselves to utilise a license based equivalent.


The most  common example of value based systems is Android and Apple. Both ecosystems represent similar but not the same ontologies. As they have progressed over the years to match consumer demand, so has their ability to provide standard out of the box security features. I researched a few years ago that consumerisation of technology and its uses based on human factors will propel the need for innovation faster than the consumer life cycle of a product. I found that only when the need for a product achieves a critical mass its ability to value add increases - almost allowing the scal e of opex and capex business concerns.


As part of an open ecosystem, attribution licenesing models like Creative Commons would also allow the cyber development effort created by an organisation to be distributed under attributed credits - this too can promote cyber development during times of increased cyber threat landscapes.


This is great for all whose activities understand the benefits of a vibrant ecosystem, in short the more you use, the better the value add proposition. Some technologies are limited in the way they work, some vendors operate licenses based on a vendor-lock in model i.e. to have the value add component you need to purchase a license against a different cost code.


Within the cyber security landscape, technologies or solutions whose base line platforms are sdk based are the best example of value add mechanisms. They combine the basics of open source licensing and enterprise level license models. ClamAV engine is an excellent example of value add technologies. ClamAV allows your in house organisation develops to use the API Libraries to develop security functions that are specific to your environment i.e the ability to create scanning logic to verify traffic across your enterprise.


Even if you had no in-house develops, your specific outsourced cyber development activities can be far more focused with a product like ClamAV and with the increase in GNU platforms, it is likely there will be a reduction in your opex costs which means, the upfront capex costs will be realised a lot sooner. You may even find that your value-add efforts have created a brand new product whose adoption may formulate an offshoot organisation. If so, its always recommended to register the offshoot organisation and operate under the correct company. This might require initial capex, however it will ensure you do not throw away opex down the line for any coverup activities and ensures you build the organisation correctly, for example, hiring contractors or consultants to carry our senior roles would have tax implications - this holds true for startup organisations, or corporations that formulate divisions on the startup model based on the value add program they are attempting to launch. It also means the money you save on coverup opex costs can be reinvested to enhance the product even more, ensuring skills and resources are correctly applied first time round. Further, it ensures you engage in accountable business methods. 


With more organisations understanding the need to have real time cyber responses, technologies that promote a sdk approach to develop the value add mechanism may soon be the new next gen cyber offering that will be embraced by all enterprises looking to have lean, responsive and effective cyber solutions. Those who can contribute to the need to have qualitative and sustainable value add approaches to cyber security will be able to further encourage the development of value add platforms, making the ability to value add itself, an excellent place for technology innovation.