Analyst & Research Reports

O'Reilly Modern Defense in Depth

Issue link:

Contents of this Issue


Page 10 of 53

CHAPTER 1 What's Not Working, and Why? When you examine the context of defending your users and public- facing web applications deployed in your data centers, you need to understand what's not working, and why. We discuss the expense and complexity of available solutions, what attackers know and understand, the deficiencies seen in both user and web application protection, a major noise problem that exists, and, finally, why attackers are so successful. Expense and Complexity of Solutions For nearly two decades, organizations have taken the multivendor approach as suggested by industry experts, deploying independent lines of defense that operate autonomously in nearly every case. Unfortunately, most of these technologies are designed to solve only a single problem, and they are often found to be marginally deployed, which equates to expensive and ineffective solutions. For example, to combat cyberthreats targeting users today, it has become a common practice to deploy independent lines of defense between users and the internet. These include next-generation fire‐ walls, advanced intrusion prevention systems, network access con‐ trol, and end-point malware protection. Data loss prevention systems, sandboxes, identity access and management systems, auto‐ mated patching solutions, security information and event manage‐ ment solutions, and so on are often deployed around the periphery of the networks supporting the users' network connectivity. 1

Articles in this issue

view archives of Analyst & Research Reports - O'Reilly Modern Defense in Depth