Sign In
The CEO Views Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
    Innovation
  • Platforms
    How IBM Maximo Is Revolutionizing Asset Management
    How IBM Maximo Is Revolutionizing Asset Management
    IBM
    7 Min Read
    Optimizing Resources: Oracle DBA Support Services for Efficient Database Management
    Oracle
    Oracle
    9 Min Read
    The New Google Algorithm Update for 2021
    google algorithm update 2021
    Google
    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service Partner Horizontal
    Oracle
    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    oracle
    Oracle
    3 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
    Gaming
    Legal
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR
    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest Minds 1
    GDPR
    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv 1
    GDPR
    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    eccenca 1
    GDPR
    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    Boldon James 1
    GDPR
    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
  • Events
Reading: Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • World’s Best Magazines
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Magazine > Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Magazine

Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.

The CEO Views
Last updated: 2020/08/07 at 5:13 AM
The CEO Views
Share
Simon Loopuit CEO Trust Hub
Simon Loopuit CEO Trust Hub

Defense-in-depth reminds me of the stories I grew up hearing from my grandmother about how kings and queens would protect themselves from invasions. Essentially they would build castles on a hill in the center of the kingdom. So if ever there was an invasion, they would have time to respond without succumbing to the enemy. The purpose was to delay the attack by increasing the number of barriers, not to prevent the attacker. This begs a question: Is this a viable strategy for protecting enterprises from today’s growing number of sophisticated cyber-threats?

The short answer is no. In the last decade, enterprises have built their security posture by layering with multiple security tools from firewalls, SIEM, User Behavior Analytics, SOAR, EDR, DLP, Email/Web Filtering, etc., and having a well-trained SOC team. The truth is that this doesn’t do the job. Despite deploying these tools, enterprises still get breached and face malicious attacks causing data frauds on a day-to-day basis.

With the shift towards cloud computing and IoT, the attack surface is growing exponentially. Additionally, in the face of advanced threats and increasing attack vectors, stacked silo solutions presents a false sense of “zero-trust” security that no longer suffice. These disparate silo security solutions are also inherently not designed to work together and, thus, leave holes that can be easily exploited by the attackers. Attackers leverage these gaps to intrude into the enterprise and then work their way deep inside. Some examples include the massive breach that happened via a cyberattack through the HVAC systems, as well as a widespread Distributed Denial of Service (DDOS) attack caused by the Mirai BOTNET targeting IoT devices, primarily home routers and IP cameras, and many more.

In addition, defining and maintaining a security posture with these disparate tools is operationally very costly as the organization needs to hire and constantly train the SMEs who must work together in the broader ecosystem. Secondly, the enterprise network perimeter is disappearing with BYOD and critical applications are being accessed in the cloud by these devices from disparate locations. So, in order to provide a comprehensive security solution, protecting only a pre-defined set of critical assets is sure-shot recipe for failure. It is, therefore, more imperative than ever to view enterprise security more holistically, as opposed to piecemeal.

Visibility is paramount to providing comprehensive “zero-trust” security. After all, what cannot be seen cannot be protected. It is vital to see all the devices (assets) and their interactions within the ecosystem. To get full visibility, it is extremely important to view not only the traffic leaving and coming into the organization but also the traffic being sent and received within the organization. This is a foundational building block towards a comprehensive security architecture, where defense-in-depth falls short.
Correlating various events from the layers of defense created by security tools is complex and challenging. The SMEs for each security tool need to compare the data extracted from each platform and the context from the past. Note that these silo solutions inherently do not integrate or communicate with each other. Typically, APIs are exposed and left to professional services for integration. Hence, adding layers of defense is a myth. Couple this with the cost and scarcity of cybersecurity talent compared to most companies’ limited security budgets. Enterprises today need machines to conduct intelligent, meaningful correlation with past context, detect anomalies and take action to contain and eliminate them or flag them to the security experts for further qualification and remediation.

Detection itself if not enough. Consider a state-of-the-art building with no sprinkler system installed to protect against fire. If there is a fire in the building, the fire station receives an alarm. But without any remediation on-site, one needs to wait for the fire engine to come and extinguish the fire. We could have actually prevented a lot of damage by having sprinklers turning on by themselves as soon as the fire was detected, and while the fire engines travel to the site. This type of behavior has even worse consequences when it comes to a cyberattack. Relying on integration with SOAR tools, as in the case with defense-in-depth security architecture, will certainly not suffice for cybersecurity in the digital era. Although it is better than just relying on SOC analysts to do damage control, there are many organizations, assets and applications that need real-time, automated response.

Lastly, compliance laws are becoming more stringent. GDPR is one such example and very soon there will strict requirements from governments in different parts of the world. How does the current defense-in-depth model stack up with these requirements? Being compliant on Day 1 is easy, but what about Day 10? Is there a drift? Which tool in the stack takes the ownership for the compliance drift in the multi-layer security model?

Many organizations are realizing that the shortcomings inherent in today’s class of defense-in-depth solutions put them at dangerous risk, and they are slowly migrating to a more comprehensive, integrated solution. As the attack surface increases and threat vectors become more complicated, it is extremely important for enterprises to re-evaluate and revamp their defense-in-depth strategy for providing comprehensive cybersecurity.

The CEO Views January 25, 2019
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article Simeon Garratt CEO and co founder Modernizing the real estate industry with digital technology
Next Article Andy Khawaja CEO Allied Wallet Allied Wallet: Comprehensive Digital Payment Solution Ensuring Smooth Shopping Experience
Tips to Give Your Small Business a Leg Up

Tips to Give Your Small Business a Leg Up

February 12, 2024
why AI projects fail
Artificial Intelligence

5 Primary Reasons Why AI Projects Fail

The CEO Views By The CEO Views March 7, 2024
Why You Should Hire a Georgia Truck Accident Attorney
Micro Blog

Why You Should Hire a Georgia Truck Accident Attorney

The CEO Views By The CEO Views February 21, 2025
Bulgarias Best Online Casinos A Guide for New and Experienced Players
Gaming

Bulgaria’s Best Online Casinos: A Guide for New and Experienced Players

The CEO Views By The CEO Views December 23, 2024
Growth Turbine
Press Release

Growth Turbine focuses on high-growth ventures cutting across various industry verticals in FinTech, SaaS, D2C, B2B, Education Technology, Blockchain, NFT via equity crowdfunding

The CEO Views By The CEO Views February 15, 2024

How to Do Online Casino Marketing

May 30, 2025

From Boardroom to Marketplace: How CEOs Are Driving Amazon Success

May 30, 2025

A Look at South Florida’s Top Personal Injury Law Firm, Hollander Law Firm Accident Injury Lawyers

May 30, 2025

The Digital Revolution Is Here – And Legacy Payment Systems Are Struggling To Keep Up

May 29, 2025

You Might Also Like

Mike Akard
ENTREPRENEUR VIEWS

A Legacy of Innovation and Excellence

14 Min Read
Nathan Udy, President & CEO
ENTREPRENEUR VIEWS

Nathan Udy: A Visionary Leader Rebuilding the Benefits System

8 Min Read
Jason Lau, CEO
ENTREPRENEUR VIEWS

Jason Lau: Leading with Problem-solving, Adaptability, and Commitment to Long-term Success

8 Min Read
Dr.Che Jordan, CEO
ENTREPRENEUR VIEWS

Dr.Che Jordan: Leading with Compassion to Transform Lives

7 Min Read
Small logos Small logos

© 2025 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?