Point Products Are Not Enough!

June 26, 2018 Arctic Wolf Networks

As covered in our previous blog post, “Are You Prepared for the Evolution of Cyberthreats?,” cybercriminals leverage a variety of tactics to profit from exploiting small and midsize enterprises (SMEs). But are SMEs evolving their cybersecurity efforts to detect and respond to this new evolution of cyberthreats?

Based on trends from the past few years, the answer appears to be “no.”

“Why do hackers continue to be so successful against SMEs?”

According to Ponemon Institute’s 2017 State of Cybersecurity in Small & Medium-Sized Businesses, 61 percent of respondents experienced a cyberattack in 2017, up from 55 percent in 2016. This upward trajectory in attack volume and frequency against SMEs is not new. In January 2016, The New York Times published an article titled “No Business is Too Small to be Hacked.” Last year, Congress addressed what CNBC called “cyberwar on small businesses” after 14 million small businesses were breached in a 12-month time span.

This raises another question: Why do hackers continue to be so successful against SMEs?

The answer is in the Definitive Guide to SOC-as-a-Service. And while there are a number of variables at play, one of them, as discussed in Chapter 2 of the guide, is an over-reliance on point solutions.

Why Are Point Products Inadequate?

Cybersecurity point products focus predominantly on prevention. The purpose of a next-generation firewall, for example, is to prevent the flow of malicious web traffic in and out of the network. An endpoint protection platform (EPP) solution performs a similar function by blocking known threats affecting endpoints.

One problem with point solutions is that, while they might protect at the edge of the perimeter, they don’t improve detection of threats after they have breached the network perimeter. Other issues include a lack of central management for the variety of tools (the much desired single pane of glass), a lack of threat intelligence (another point product provides this) to help with incident response, and so on.

To learn more about the different types or point products and why they struggle to improve SME security posture alone, download the “Definitive Guide to SOC-as-a-Service” below.

 

Previous Article
Law Firms and Cyberthreats: Lawlessness in the Land of Law
Law Firms and Cyberthreats: Lawlessness in the Land of Law

Cyberattacks within the legal industry are becoming quite common. The 2017 Legal Technology Survey reported...

Next Article
Vendor Risk Management: Minimizing the Burden, Ramping Your Business
Vendor Risk Management: Minimizing the Burden, Ramping Your Business

It’s not just regulators; suppliers must also comply with security policies of corporate partners.

×

Want cybersecurity updates delivered to your inbox?

First Name
Last Name
Company
!
Thanks for subscribing!
Error - something went wrong!