Security Basics mailing list archives

RE: Re: End Point Security - relying on one vendor's product a weakness in itself?


From: "Paul Yeo" <Paul.Yeo () wdc com>
Date: Sat, 5 Apr 2008 14:30:13 +0800

Hi HaYNstyle,

Could you shed some lights as in what kind of systems, from which vendor
that you used for your defense-in-depth approach. I am a complete newbie in
this concept, while digging through the web. Can someone help to point me to
the correct direction?

Thank you very much!

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of 6us4jxp02 () sneakemail com
Sent: Thursday, March 06, 2008 8:40 PM
To: security-basics () securityfocus com
Subject: Re: Re: End Point Security - relying on one vendor's product a
weakness in itself?

With regards to the Total endpoint solution, for the most part I was taught
and have learned that a completely multi vendor solution is the only way in
which to achieve "Defense in Depth" or a "Layered Defense" approach.  But as
I grew smarter and wiser in this field I have learned.  



Defense in Depth is layer technologies on top of one another, but has
nothing to do with a vendor agnostic approach.  What happens in a vendor
agnostic approach is increased price and complexity.  While most vendors
arent able to implement multi-vendor supported solutions because of the
closed nature of software, we are stuck augmenting the operations of the
solutions.  This drives up the complexity within our own network
enviornments by at least 10 fold.



I have tested some of the new endpoint security solutions and the one thing
that I have found is that they work pretty well, most of the new approaches
have been to integrate entire solutions to include AV/AS, Firewalls,
IPS/IDS, and other solutions.  They include everything that I need from one
vendor which makes support issues easier. 



Just remember though, the comment posted previously which says if you have a
hole in one machine, then you have them on all of your windows machines is
incorrect.  The defense in depth approach means that you would have to have
a hole through your Entire Security structure through the Gateway, then your
firewall, then your core router, then your internal routing grid, then your
servers, then your desktops and so on.  If you have this type of
vulnerabillity or any mix of these then you need a security makeover by the
extreme makeover business teams!  =)



In the end, choose what works best for you.  These solutions works well for
my company of over 150,000+ people, but your company might have different
needs.

Thanks,

HaYNstyle


Current thread: