Article

Do blended threats call for all-in-one or best-of-breed devices?

Amy Storer, News Writer

LAS VEGAS -- According to speakers at Interop 2005, blended threats present increasing risks to networks and are among the most significant and dangerous problems to guard against in the near term.

But one major question arose: Does the best approach for stopping blended threats involve numerous best-of-breed products or a single, comprehensive device?

The key speakers at Tuesday's session entitled "Combating blended threats with blended countermeasures" were Phil Kwan, director of product management for Sunnyvale, Calif.-based Fortinet Inc., and Vincent Weafer, security response senior director for Cupertino, Calif.-based Symantec Corp.

Kwan said blended threats, which combine the characteristics of viruses, worms, trojans and malicious code, are often carried into an enterprise network via spam in order to elude customary lines of defense. In most cases, they ultimately seek to exploit a known vulnerability within an operating system.

Both Kwan and Weafer agreed that blended threats are best combated with a comprehensive all-in-one security device.

Kwan said the new generation of combination security devices combines network-based security features with real-time updates and a layered approach that culminates firewall, IDS/IPS, antivirus, antispam and Web content filtering capabilities.

    Requires Free Membership to View

For more information

Read another Interop exclusive: Chambers links business success to the network

 

Learn how a blended approach is being used to stop IM threats

 

Weafer endorsed the all-in-one approach because it enables all the different threat defense mechanisms to work together with greater efficiency.

"There's a benefit of having these things correlate," Weafer said. "Simply bundling [services] isn't the answer."

However, moderator David Piscitello, president of Chester Springs, Pa.-based consulting firm Core Competence Inc., had a different opinion. He said he doesn't believe there will ever be one device that fulfills all corporate network security needs, which is why companies should pursue a best-of-breed strategy that focuses on each firm's specific security needs.

Michael Noakes, a network engineer with the U.S. Department of Defense, said he agreed with Piscitello's opinion.

"There are just too many limitations involved with just having one set of eyes on your network," Noakes said. "We're better off with various security measures because what one vendor doesn't catch the other one will, and visa versa."

Noakes said the Department of Defense has several best-of-breed devices and services deployed on its network. In fact, for issues such as antivirus protection, it layers two vendors' products to provide a higher standard of security.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: