Issue link: https://insights.oneneck.com/i/1458399
CHAPTER 4 Leveraging Unmatched Threat Protection 45 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Chapter 4 IN THIS CHAPTER » Revisiting defense in depth » Redefining the security perimeter » Exploring key components of threat protection » Working together to deliver effective threat protection Leveraging Unmatched Threat Protection I n this chapter, you explore the challenges of traditional defense in depth and perimeter-based security best practices, learn the essentials of threat protection, and discover why a broad eco- system of security partners is critical to delivering unmatched threat protection in data centers and hybrid cloud environments. The Challenges of Defense in Depth Defense in depth is a well-understood and long-accepted secu- rity maxim. The basic idea of defense in depth is to deploy mul- tiple security detection and prevention solutions to address a wide array of potential threats. For example, an organization might typically deploy firewalls, intrusion preventions (IPS), and anti- virus software. Over time, a whole litany of new point security solutions ("innovations") from different security vendors were developed and sold, including web content filtering, email secu- rity (anti-spam) gateways, web application firewalls (WAFs), data loss prevention (DLP), distributed denial-of-service (DDoS) defense, network vulnerability scanning, cloud access security brokers (CASB), security information and event management (SIEM), and much more.