Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall performance of the solution. Each of these factors should be considered over the course of the useful life of the solution, including:
- Where will it be deployed?
- What is the predominant traffic mix?
- What security configuration/policy is applied?
There is usually a trade-off between security effectiveness and performance; a product’s security effectiveness should be evaluated within the context of its performance (and vice versa). This ensures that new security protections do not adversely impact performance and security shortcuts are not taken to maintain or improve performance.