When cyber security products and strategies are layered, it is commonly believed that their combined effects will effectively insulate organizations from cyber attacks. A recent study conducted by Texas-based security research and advisory firm NSS Labs, however, suggests that the layered approach largely fails to block exploits.
Layered defence is “still good” according to Stefan Frei, research director of NSS, but technologies such as intrusion prevention systems, endpoint protection and next-generation firewalls showed “significant” failures to detect exploits.
He said the failure of many products to detect exploits can be partly blamed on shared threat intelligence. According to Frie most vendors use the same sources of threat intelligence. The result is that their products tend to have the same deficiencies as well.
In order to be effective, user need to know what the right combination of products to deploy, he said.
Frei also advised users to mix things up and use different vendors.
He cautioned against deploying products from the same vendors. He said the study found that failure correlation between products from the same vendor extremely high.
Using multiple vendors, however, could introduce more complexity, according to Michael Fey, executive VP of security software firm McAfee Inc. He said organizations need to determine the detection methods being used by the products they deploy in order to avoid duplication of functions.