Debate

By
Follow google news

Defense-in-depth is proving to be an expensive failure

FOR, by Abe Kleinfeld, president and CEO, nCircle


Although security spending continues to rise, executives remain frustrated that businesses are far from the desired goal. Organizations need to rethink their security strategies in order to improve effectiveness while containing costs.

What's needed is a balanced approach that adds proactive security solutions to "shrink the targets." These solutions are intelligence-based -- they continuously gather a deep understanding of everything running on an IP network to identify areas of risk, and then prioritize the remediation of that risk.

Proactive solutions -- vulnerability and risk management systems -- also capture the intelligence needed for regulatory compliance.

It's a far more effective approach to balance spending on both reactive and proactive solutions than to simply add more depth to reactive systems. Only when organizations balance their spending on both stopping the bullets and shrinking the targets will security nirvana be achieved. It's time for "defense-in-depth" to give way to "defense-in-balance."

AGAINST, by Brian Contos, chief security officer, ArcSight

Defense-in-depth is more critical than ever before. There has been an increasing trend to correlate disparate events from routers, firewalls and mainframes with document management tools, enterprise applications and virtually everything in-between.

Various avenues of access, such as wireless, remote access, removable media, P2P, IM and reverse HTTP tunnels, make getting information in and out of an organization trivial. If you fail to log and monitor everything and everyone, you will likely miss the problem – especially if you are simply depending on internet firewalls and intrusion detection systems to do all the work. If you have not experienced a security issue yet – consider yourself lucky, but do not consider yourself secure. You do not need to be a skilled hacker to copy 50 gigs of customer files to your MP3 player, and this type of low-tech security breach has led to a steady rise in insider threats that, in turn, have led to identity theft, increases in fraud and organized crime.

This is why defense-in-depth is necessary and why it is not a failure.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

National photo licence recognition system set to go live in 2025

National photo licence recognition system set to go live in 2025

Hackers using F5 devices to target US gov networks

Hackers using F5 devices to target US gov networks

Qantas says customer data released by cyber criminals

Qantas says customer data released by cyber criminals

Austrade to replace its data centre core network

Austrade to replace its data centre core network

Log In

  |  Forgot your password?