Issue link: https://insights.oneneck.com/i/1458399
46 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. As a result, defense in depth, for many, has become defense ad nauseam. Unfortunately, there are very real consequences of a poorly planned defense in depth strategy. Aside from the obvi- ous, and likely exorbitant, cost of purchasing and maintaining multiple point security solutions for a hybrid cloud environment, there is the inherent complexity that comes with deploying and operating numerous point security solutions. Complexity creates numerous security challenges including: » Lack of a cohesive, end-to-end security strategy. Many point security solutions have overlapping capabilities and functions. Inevitably, there will also be capability and coverage gaps. Without a complete understanding of the capabilities and functionality in all the different solutions and a coherent cybersecurity policy, the enterprise security posture will be weakened. » Limited integration and interoperability. Not all point security solutions play well with others. In fact, most don't. This makes it difficult for security teams to correlate events and respond to threats in real time. It can also lead to siloed operations and finger-pointing during troubleshooting and incident response. So now, not only do your toys not play well together — neither do your network and security teams! » Error-prone configuration and operation. Network and security professionals must learn how to properly configure and operate each of these point security solutions. They all have different operating systems, dashboards, command syntaxes, and more, even if they are all made by the same security vendor — which they rarely are. As a result, mistakes are made, and security vulnerabilities are unwittingly exposed. » Shortage of security skills. The worldwide shortage of security professionals is an ongoing problem for every enterprise today and for the foreseeable future. Attaining, training, and retaining top security talent is hard enough. Add to that the frustration that comes with having to settle for being a "jack of all trades, master of none" and trying to sleep at night worrying about becoming the next big data breach story and it's easy to understand why security talent is in short supply. Complexity is the enemy of an effective enterprise cybersecurity strategy.