CyberSecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

FireEye | 11/01/2014

The data comes from organizations testing FireEye network and email appliances but not yet fully protected by the FireEye platform. These tests provide a unique vantage point to observe other security layers in action because FireEye network appliances sit behind all conventional security defenses.2 Therefore, by definition, any threats observed by FireEye in these tests have passed through all of an organization’s other security layers.

To read more, please log in