The irony of the evolution of the network is that as we make applications, data, and services flow faster across an increasingly diverse landscape of users, devices, and domains, we have compounded the complexity of securing this new environment.
That’s because our tendency has been to just keep adding new security devices to an already overburdened security closet. But as the continued increase of network compromises indicates, this approach isn’t solving the problem. The fact is that while the new devices you are buying and deploying may decrease the time it takes to discover new threats, data shows that the time required for an attack to compromise your network has decreased even faster, and you aren’t keeping up.