The Cons of a Silver Bullet Approach to Endpoint Defense

  /     /     /  
Publicated : 22/11/2024   Category : security


The Cons of a Silver Bullet Approach to Endpoint Defense


Companies relying on individual security solutions wont find one is a silver bullet that will provide seamless protection.



Endpoint tools often promise to be a silver bullet to tackle all security problems. The problem is, no single product will fix everything, and businesses are left to juggle several tools that dont work together.
In the last 10 years, the industry is following a destructive path of new threat, new widget, new threat, new widget, says Brian Dye, McAfees EVP of corporate products. Over time, he explains, companies amass a collection of individual security products that dont integrate and consequently spend more time on administration than on security.
McAfee is doubling down on endpoint strategy as it
transitions
back to a standalone business following its spinoff from Intel earlier this year. Dye says the focus is less on first-gen and next-gen point products, and more on how to build an architecture that adapts to changing threats.
Many businesses market their products in line with industry news, says Dye. Amid the fallout of WannaCry, for example, there was a rise in products promising defense against ransomware.
Each wave of technology promises to be the answer to world hunger, he continues. The bad guys always find a way around it. Next-gen products promise to fix security problems but dont integrate with the broader security framework, he explains.
The effectiveness of threat defense is one of the key challenges facing businesses this year, McAfee found in its
2017 Threats Predictions report
. New techniques gain value throughout deployment and improve as they face real-life scenarios. The upward trend continues until the defense becomes so effective it motivates adversaries to respond.
At this stage, attackers experiment and discover ways to evade this type of defense and develop countermeasures to reduce its value, the report states.
Different technologies perform different functions in the process of protection, detection, and correction, says Dye. Machine learning, antivirus, intrusion prevention, and enterprise detection and response (EDR) are all examples of technologies that work better together than alone.
To make endpoint work, you need a platform, says Dye. It needs to combine the strengths of many different technologies so you account for the weaknesses of those technologies.
When an attacker runs malware, for example, individual tools for machine learning and EDR can try to decide whether the threat is real. On their own, each might indicate it
might
be a threat and security teams may not respond. However, if the tools collaborated and all detected a potential threat, a team would be more likely to investigate and avoid a false positive.
Theres a core tradeoff in how effective security is, and how much risk you put to the user in terms of false positives, says Dye. The key is to have the ability to stop the bad things and not stop the good things.
Large enterprises have an advantage in building this type of flexible platform, which Dye calls the dynamic endpoint, because they have dedicated teams and the bandwidth to try new technologies that will give them a more well-rounded defense. Small and midsize businesses dont have the luxury of being able to test every vendor claim, he notes.
Dye cautions security teams about the danger of continuing the silver bullet approach to security instead of the flexible architecture approach.
The danger is … youll stay on the hamster wheel, he explains. Youll purchase and deploy a solution with the strength of one technology, and youll end up having to deploy another one in another year. Youll spend all your time on admin and suck resources away from what youre supposed to be doing.
Related Content
8 Most Overlooked Security Threats
Rethinking Vulnerabilities: Network Infrastructure as a Software System
Securing IoT Devices Requires a Change in Thinking

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
The Cons of a Silver Bullet Approach to Endpoint Defense