A layered security method for detecting malware cyber-attacks is the current “go-to” way to safeguard both network perimeters and also individual endpoints. Yet layered security doesn’t accomplish much uneven it triggers an appropriate and effective response.

You are watching: Advantages and disadvantages of layered security

Typically because that the stand-alone layers, the regional independent countermeasures of every layer space not sufficient unless lock are consistent with pre-planned responses particular to the enterprise network gift defended. Active anticipation that potential cyber-attacks and also how to respond is key. Together Edmund Burke as soon as said: “Better to it is in despised for as well anxious apprehensions, than damaged by too confident security”.


Defense versus the boosting scale and also complexity that today’s cyber-attacks (e.g., DDOS, zero-day, password list, APT, and also targeted attacks) relies greatly on developments in commercially-available automated defense software and appliances. Collectively, enterprises invest billions of dollars on this products and also services adding layer top top layer of security from progressed firewall appliances to data loss avoidance (DLP) applications.

Over the previous decade, layered security and defense has arisen into a distinct and widely-adopted enterprise protection strategy. The ide is simple: any one class of security might not catch everything, however multiple layers, each through its very own strengths and weaknesses, compensate for the shortcomings of other layers. Firewalls, anti-malware, anti-spam, intrusion detection, DLP, encryption, sandboxing room layered to carry out multiple opportunities to stop successful cyber-attacks.

Unfortunately, cyber-attackers every too conveniently probe and learn how each that these defensive layers works. They have the right to then it is adapted their malicious advanced Persistent Threat methods to defeat individual brand-new layers and, worse, figure out methods to circumvent the entire structure of the layered defense. Ultimately, the layered security approach suffers native weaknesses comparable to those the the individual layers the so effectively combines: each layer the is added carries the own prices – including maintenance and operations expenses to the companies while possibly negatively affecting network performance and user experience.

At best, a layered security strategy by itself is only a way for defenders to try to save up through the adaptations the attackers. The will constantly be at least half a step behind the latest technologies of the cyber-attackers .

Incident an answer Planning supplies a way to incorporate automated layered security right into an all at once defense that succeeds in thwarting attackers even when lock penetrate every one of the protection layers.

The very first step is to make layered security component of in its entirety network visibility. Rather than stand-alone defense systems, detection details from firewalls and anti-virus have the right to be incorporated real-time and correlated with various other sources (such together network flow data), that administer alerts come the incident of other suspicious. These alerts, in turn, can emphasis attention and also trigger examination with a much wider context 보다 an separation, personal, instance stand-alone protection layer can provide.

Incident solution is not another layer of defense defense. One Incident solution Plan anticipates the habits of malicious task that may take place within one enterprise and sets policy, in advance, for detecting, responding, and recovering native actual cyber-attacks and also malicious task . The setup defines what network occasions will cause security incidents and investigations, as well as the procedures and timing of escalations if occurrences remain unresolved. Structure an incident response system for cyber-security is a combination of (i) security policies and employee awareness; (ii) integrated and cross-correlated detection systems, (iii) defense staff the investigate, understand, and also resolve prompted incidents, (iv) pre-planned procedures and timing the ensure unresolved incidents receive fashionable escalated fist to executives responsible for recurring risk management and, if needed, the engagement of external security sources to ensure resolution.

Incident an answer is not one more layer that security. It is an combined dynamic device of policies, people, and also automation devices that for sure effective and also timely detection, understanding, and response to all security events wherever and however they happen in the companies network. A great incident an answer system integrates all the layers of security with a contextual knowledge of every the network activity to carry out timely and also effective information assurance.

See more: Closest International Airport To Lancaster Pa (And 3 Major Airports Nearby)

To learn an ext about improving your layered protection with incident an answer planning visit the Incident solution System page.



Patti is our global Partner Manager she assists international partners by control marketing and also sales plans from command assignment v the sales cycle. Patti is also responsible to recognize potential worldwide markets come determine demand for partner monitoring in those applicable areas. When Patti is not helping partners spread the good news around how lot Scrutinizer can assist their customers she enjoys safety time v her children and also grandchildren, evangelizing, hiking, fishing , beekeeping and gardening