For the longest time, we’ve been told that the best defence against cyberattacks is to use a defence-in-depth (DID) strategy, which involves using dependent layers of security controls so a failure in one doesn’t impact all others.
Today, enterprises will likely have multiple layers of security piled on top of one another from network, perimeter, application, endpoint security, session, human, and presentation to the transport layer. Countless point solutions are available for each layer.
According to a Ponemon Institute Cyber Resilient Organisation Report, businesses typically deploy 45 cybersecurity tools on average to protect their networks and systems. Having so many solutions doesn’t guarantee 100% protection. The report noted that businesses that use more than 50 cybersecurity tools register an 8% decline in threat detection effectiveness and a 7% decrease in defence abilities.
For the full article, click here