Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/31/2017
11:41 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

The Cons of a 'Silver Bullet' Approach to Endpoint Defense

Companies relying on individual security solutions won't find one is a 'silver bullet' that will provide seamless protection.

Endpoint tools often promise to be a "silver bullet" to tackle all security problems. The problem is, no single product will fix everything, and businesses are left to juggle several tools that don't work together.

"In the last 10 years, the industry is following a destructive path of 'new threat, new widget, new threat, new widget,'" says Brian Dye, McAfee's EVP of corporate products. Over time, he explains, companies amass a collection of individual security products that don't integrate and consequently spend more time on administration than on security.

McAfee is doubling down on endpoint strategy as it transitions back to a standalone business following its spinoff from Intel earlier this year. Dye says the focus is less on first-gen and next-gen point products, and more on how to build an architecture that adapts to changing threats.

Many businesses market their products in line with industry news, says Dye. Amid the fallout of WannaCry, for example, there was a rise in products promising defense against ransomware.

"Each wave of technology promises to be the answer to world hunger," he continues. "The bad guys always find a way around it." Next-gen products promise to fix security problems but don't integrate with the broader security framework, he explains.

The effectiveness of threat defense is one of the key challenges facing businesses this year, McAfee found in its 2017 Threats Predictions report. New techniques gain value throughout deployment and improve as they face real-life scenarios. The upward trend continues until the defense becomes so effective it motivates adversaries to respond.

"At this stage, attackers experiment and discover ways to evade this type of defense and develop countermeasures to reduce its value," the report states.

Different technologies perform different functions in the process of protection, detection, and correction, says Dye. Machine learning, antivirus, intrusion prevention, and enterprise detection and response (EDR) are all examples of technologies that work better together than alone.

"To make endpoint work, you need a platform," says Dye. "It needs to combine the strengths of many different technologies so you account for the weaknesses of those technologies."

When an attacker runs malware, for example, individual tools for machine learning and EDR can try to decide whether the threat is real. On their own, each might indicate "it might be a threat" and security teams may not respond. However, if the tools collaborated and all detected a potential threat, a team would be more likely to investigate and avoid a false positive.

"There's a core tradeoff in how effective security is, and how much risk you put to the user in terms of false positives," says Dye. "The key is to have the ability to stop the bad things and not stop the good things."

Large enterprises have an advantage in building this type of flexible platform, which Dye calls the "dynamic endpoint," because they have dedicated teams and the bandwidth to try new technologies that will give them a more well-rounded defense. Small and midsize businesses don't have the luxury of being able to test every vendor claim, he notes.

Dye cautions security teams about the danger of continuing the "silver bullet" approach to security instead of the flexible architecture approach.

"The danger is … you'll stay on the hamster wheel," he explains. "You'll purchase and deploy a solution with the strength of one technology, and you'll end up having to deploy another one in another year. You'll spend all your time on admin and suck resources away from what you're supposed to be doing."

Related Content

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3035
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
CVE-2021-3036
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
CVE-2021-3037
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
CVE-2021-3038
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
CVE-2021-3506
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...