Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Today’s Security Trap: Increasing Spending but Not Efficacy

Many organizations assume that once security controls are put in place, they will be effective indefinitely

Many organizations assume that once security controls are put in place, they will be effective indefinitely

According to Gartner, organizations are expected to spend $150.4 million on IT security and risk management technologies in 2021, which would reflect a 12.4 percent increase compared to 2020. You would think with that much money invested in security we would be several steps ahead of the bad guys. However, hardly a week goes by without a new high-profile cyber-attack (e.g., Radixx, Pulse Security, Trend Micro, SolarWinds, Shopify, CryptoForHealth Twitter hack). In this context, it is essential for organizations to understand that security solutions’ efficacy matters more than the fact they are deployed. What’s the value of a security tool if it fails to work the way it is intended. So, what can be done to assure security efficacy?

Typically, security effectiveness is measured by an organization’s ability to protect against known and unknown threats. To prevent a threat from exploiting a vulnerability that would generate a security incident, organizations most commonly rely on the implementation of security controls in combination with security tools. Unfortunately, many organizations assume that once security controls are put in place, they will be effective indefinitely. As a result, validation of whether established security controls are working as intended, often does not occur. This approach leads to blind spots that are being exploited by cyber adversaries in their attack chain, increasing an enterprise’s cyber risk exposure unnecessarily. 

You Cannot Fix, What You Cannot See

Reviewing Security ToolsWhy perform requests for proposals, proof of concepts, and time-consuming vendor selection processes if you cannot validate that the security solution you implemented is doing what it’s intended to do? This includes, identifying gaps so you can fine-tune the configuration and continuous validation through automated monitoring to mitigate potential decay in the health of the tool.

Unfortunately, many security solutions lack the capability to monitor their own integrity or health, often turning an organization’s investment into shelf-ware. While it may be true that the health of a security application can be impacted by faulty implementations, poor integrations, and lackluster maintenance, more commonly the following factors influence the integrity and efficacy of security applications:

• Re-imaging of an end user’s device often leads to the software not being re-installed.

• Critical files are often corrupted when new third-party applications are installed or updated.

• Negligent users that damage or remove applications unknowingly.

Advertisement. Scroll to continue reading.

• Malicious insiders and/or hackers that disable security applications to bypass security controls.

In fact, according to the 2020 State of Endpoint Resilience Report (PDF), nearly one in three enterprise devices have security applications (e.g., anti-virus, anti-malware, endpoint protection, client management, VPN) installed that are no longer working as intended. Furthermore, more than five percent of enterprise devices were missing one or more of these critical controls altogether.

Continuous Efficacy Assessment and Mitigation

To improve security processes, the continuous collection and analysis of relevant data to test the efficacy of controls is necessary. As mentioned above, without knowing whether the health of a security application has been jeopardized, an organization’s ability to react to malicious actions, collisions, or software damage, is impossible. In turn, we are seeing the introduction of enhanced regulations (e.g., PCI DSS, NIST SP 800-137) that prescribe continuous diagnostics of security controls. 

In this context, more and more security practitioners are taking advantage of a new concept described as application persistence, which refers to the ability of a software-based application to continue functioning across disruptions, unintentional decay, or malicious actions that are fundamental to its operation. 

As a result, application persistence contributes to an organization’s digital resilience by providing the needed visibility to assess security efficacy and offering the ability to self-heal critical third-party security applications when they’re disabled, altered, or otherwise made vulnerable. Organizations taking advantage of application persistence as part of their endpoint security strategy can achieve the following benefits:

• Ensure application integrity by maintaining health and efficacy.

• Increase operational efficiency by relying on automatic, zero-touch, built-in resilience.

• Reduce IT helpdesk tickets for application failures.

• Maximize productivity by guaranteeing availability of mission-critical applications.

• Increase ROI for existing security and software investments.

The most effective application persistence solutions are embedded in the firmware of endpoint devices, assuring that neither decay nor malicious actions can tamper with their self-healing capabilities and enabling the collection of the most granular information sets across devices, applications, and data.

Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different. That’s because every security application added to an endpoint device has the potential to increase complexity and risk exposure, contribute to application decay, and affect the overall health of the device. Instead, organizations should focus on validating security efficacy regardless of how many security controls or applications have been deployed.

RelatedThe VC View: Data Security – Deciphering a Misunderstood Category

Related: Firmware Attacks Outpacing Security Investments, Microsoft Says

Written By

Dr. Torsten George is an internationally recognized IT security expert, author, and speaker with nearly 30 years of experience in the global IT security community. He regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege for Dummies book. Torsten has held executive level positions with Absolute Software, Centrify (now Delinea), RiskSense (acquired by Ivanti), RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global), Digital Link, and Everdream Corporation (acquired by Dell).

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Endpoint Security

The Zero Day Dilemma