At the center of every Defense in Depth diagram is databases and data. Yet our industry focuses most of its effort and money on the perimeter.
Firewalls, VPNs, networks, end-point monitoring, behavioral analytics, and identity management all have value ... but they are not Defense in Depth?
Databases are not bit buckets. They contain tools that can be used to exfiltrate data and tools that can be used to support and conceal an attack: Many of which do not require escalated privileges for use.
To achieve Defense in Depth you must have a solution at every level of the stack and a solution that will prevent inappropriate access by someone with valid credentials.
Our Resource pages are our "Proof of Competence" and we encourage you and your technical staff to explore the many code demos, presentations and detailed explanations we publish.
Then, contact us to explore the many ways that our Subject Matter Expertise can help protect you and your organization.
Use the links, at top, to access detailed information about our services including a free, no sales pitch, Lunch & Learn for your team. |