Sign In
Small logos Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
  • Platforms
    The New Google Algorithm Update for 2021
    Google algorithm update for 2021
    Google

    Google is continuously making improvements to its algorithm and how websites are ranked on its organic search results page. This…

    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service-Partner-Horizontal
    Oracle

    ORACLE OPENWORLD — Oracle today announced that the Oracle Cloud Platform has been validated to develop applications using India Stack…

    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    Oracle

    Oracle today announced that AT&T signed an agreement to move thousands of its large scale internal databases to Oracle’s Cloud…

    3 Min Read
    IBM and Andrés Cepeda introduce First ‘Cognitive Music’ Project in Latin America
    IBM-Watson
    IBM

    IBM (NYSE: IBM) and Grammy-winning Colombian singer, songwriter and producer Andrés Cepeda will partner to collaboratively compose the artist’s next…

    3 Min Read
    Alpine Consulting Launches New eCommerce Website for Dana Rebecca
    IBM

    The new website will provide clients with the ability to more easily browse the latest innovations and designs in the…

    2 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR

    RISMA Systems was founded in 2014 by Lars Nybro Munksgaard, who initially developed a system that helped accountants and lawyers…

    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest-Minds
    GDPR

    We are currently living in two different worlds – the digital world and the physical one. One day the twain…

    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv
    GDPR

    As a professional services business operating in a world driven by data and technology, Gemserv like many businesses,  finds itself…

    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    GDPR

    Enterprises often restrict their privacy management strategy to customer data only. Though it is the personal data of employees, spread…

    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    GDPR

    As we fast approach the second anniversary of the implementation of GDPR, the impact it has had on businesses and…

    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Reading: Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • Home
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Entrepreneurs View
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Magazine > Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Magazine

Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.

CEO
Last updated: 2020/08/07 at 5:13 AM
CEO
Share
Simon-Loopuit
SHARE

Defense-in-depth reminds me of the stories I grew up hearing from my grandmother about how kings and queens would protect themselves from invasions. Essentially they would build castles on a hill in the center of the kingdom. So if ever there was an invasion, they would have time to respond without succumbing to the enemy. The purpose was to delay the attack by increasing the number of barriers, not to prevent the attacker. This begs a question: Is this a viable strategy for protecting enterprises from today’s growing number of sophisticated cyber-threats?

The short answer is no. In the last decade, enterprises have built their security posture by layering with multiple security tools from firewalls, SIEM, User Behavior Analytics, SOAR, EDR, DLP, Email/Web Filtering, etc., and having a well-trained SOC team. The truth is that this doesn’t do the job. Despite deploying these tools, enterprises still get breached and face malicious attacks causing data frauds on a day-to-day basis.

With the shift towards cloud computing and IoT, the attack surface is growing exponentially. Additionally, in the face of advanced threats and increasing attack vectors, stacked silo solutions presents a false sense of “zero-trust” security that no longer suffice. These disparate silo security solutions are also inherently not designed to work together and, thus, leave holes that can be easily exploited by the attackers. Attackers leverage these gaps to intrude into the enterprise and then work their way deep inside. Some examples include the massive breach that happened via a cyberattack through the HVAC systems, as well as a widespread Distributed Denial of Service (DDOS) attack caused by the Mirai BOTNET targeting IoT devices, primarily home routers and IP cameras, and many more.

In addition, defining and maintaining a security posture with these disparate tools is operationally very costly as the organization needs to hire and constantly train the SMEs who must work together in the broader ecosystem. Secondly, the enterprise network perimeter is disappearing with BYOD and critical applications are being accessed in the cloud by these devices from disparate locations. So, in order to provide a comprehensive security solution, protecting only a pre-defined set of critical assets is sure-shot recipe for failure. It is, therefore, more imperative than ever to view enterprise security more holistically, as opposed to piecemeal.

Visibility is paramount to providing comprehensive “zero-trust” security. After all, what cannot be seen cannot be protected. It is vital to see all the devices (assets) and their interactions within the ecosystem. To get full visibility, it is extremely important to view not only the traffic leaving and coming into the organization but also the traffic being sent and received within the organization. This is a foundational building block towards a comprehensive security architecture, where defense-in-depth falls short.
Correlating various events from the layers of defense created by security tools is complex and challenging. The SMEs for each security tool need to compare the data extracted from each platform and the context from the past. Note that these silo solutions inherently do not integrate or communicate with each other. Typically, APIs are exposed and left to professional services for integration. Hence, adding layers of defense is a myth. Couple this with the cost and scarcity of cybersecurity talent compared to most companies’ limited security budgets. Enterprises today need machines to conduct intelligent, meaningful correlation with past context, detect anomalies and take action to contain and eliminate them or flag them to the security experts for further qualification and remediation.

Detection itself if not enough. Consider a state-of-the-art building with no sprinkler system installed to protect against fire. If there is a fire in the building, the fire station receives an alarm. But without any remediation on-site, one needs to wait for the fire engine to come and extinguish the fire. We could have actually prevented a lot of damage by having sprinklers turning on by themselves as soon as the fire was detected, and while the fire engines travel to the site. This type of behavior has even worse consequences when it comes to a cyberattack. Relying on integration with SOAR tools, as in the case with defense-in-depth security architecture, will certainly not suffice for cybersecurity in the digital era. Although it is better than just relying on SOC analysts to do damage control, there are many organizations, assets and applications that need real-time, automated response.

Lastly, compliance laws are becoming more stringent. GDPR is one such example and very soon there will strict requirements from governments in different parts of the world. How does the current defense-in-depth model stack up with these requirements? Being compliant on Day 1 is easy, but what about Day 10? Is there a drift? Which tool in the stack takes the ownership for the compliance drift in the multi-layer security model?

Many organizations are realizing that the shortcomings inherent in today’s class of defense-in-depth solutions put them at dangerous risk, and they are slowly migrating to a more comprehensive, integrated solution. As the attack surface increases and threat vectors become more complicated, it is extremely important for enterprises to re-evaluate and revamp their defense-in-depth strategy for providing comprehensive cybersecurity.

CEO January 25, 2019
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article Modernizing the real estate industry with digital technology
Next Article Andy Khawaja Allied Wallet: Comprehensive Digital Payment Solution Ensuring Smooth Shopping Experience
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Top 6 Ways You Can Grow Your Business Using Data Science

Top 6 Ways You Can Grow Your Business Using Data Science

Data is increasing at an unsustainable pace. According to recent…

June 23, 2021
Successful Branding Strategy
Micro Blog
Why Product Packaging Is Essential For Successful Branding Strategy

When it comes to successful branding strategy, packaging is one of the…

7 Min Read
Charles Vorwaller Photograph
ENTREPRENEUR VIEWS
Aspen Laser: Revolutionizing Pain Management with Drug Free Photobiomodulation

The US is facing an impending chronic pain crisis as over 25%…

10 Min Read
Data Room Due Diligence
Micro Blog
Why Is Data Room Due Diligence Important For Business?

Mergers and acquisitions (M&A) are frequently intricate deals. While the two firms'…

7 Min Read
monte wyatt
Press Release
Iowa Based Thought Leader Recognized by SUCCESS Magazine

Since 1897, SUCCESS Magazine has been the leading voice for people who…

3 Min Read

Eight Things You Need If You’re Going To Invest In Cryptocurrency

Cryptocurrencies like Bitcoin and Ethereum present…

September 29, 2023

Finding the Best Usenet Search Product: Your Ultimate Guide

In the vast realm of the…

September 29, 2023

What Is the Significance of Internet Safety Education in a Hyperconnected World?

Although we are born with smartphones…

September 29, 2023

Skybridge Americas: Revolutionizing Customer Service With Talent and IT Innovation

Investing in customer experience has proven…

September 18, 2023

You Might Also Like

ENTREPRENEUR VIEWS

Skybridge Americas: Revolutionizing Customer Service With Talent and IT Innovation

Investing in customer experience has proven to be the key to long-term success for Skybridge Americas, the people-driven company known…

11 Min Read
ENTREPRENEUR VIEWS

YELLOW BRICK ROAD: Unleashing Child’s Imagination With Unique Child Care Programs

Early childhood offers a critical window of opportunity and sets the building blocks to shape a child's holistic development. When…

10 Min Read
ENTREPRENEUR VIEWS

PATRICK R. RICCARDS: Transforming The Teaching And Learning 0f American History

An exceptional visionary and dynamic leader, Patrick R.  Riccards, the CEO of Driving Force Institute exudes an un  wavering drive…

9 Min Read
ENTREPRENEUR VIEWS

Jason A. Corning: Building A Better Future For The Disabled Community

Jason Corning was born deafblind. Like any other disabled person, he went through rigorous challenges both physical and mental and…

10 Min Read
Small logos Small logos

© 2023 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Is Defense-in-Depth the Solution for Comprehensive “Zero-Trust” Security? Not So Much.
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?