Jason Pappalexis, John Whetstone, Will Fisher, Mike Spanbauer
Threat actors are demonstrating the ability to bypass protection offered by conventional endpoint and perimeter security solutions. In turn, enterprises must evolve their network defenses to incorporate a different kind of protection, one that NSS Labs defines as a breach detection system (BDS). Although initially exclusive to large or very large enterprises, the use of BDS has begun to move down-market into small and medium-sized enterprises.
Enterprises can use this information to gain critical insights into the purpose and use of BDS technology. These insights include information on how this security control is being managed within organizations, where it is being deployed, who is responsible for purchasing decisions, and the extent to which API controls are being used for its management.
WHAT’S IN THIS REPORT:
- Product scope, alternatives, deployment, and purchase authority
- Metrics on product use within the enterprise
- Who manages BDS? (breakdown by organization size)
- Who uses API controls? (breakdown by organization size)
- Enterprise challenges
ABOUT THIS STUDY:
Part of a series on security controls deployed by US enterprises, this brief includes current usage statistics for BDS within small and medium-sized enterprises (SMEs), large enterprises (LEs), and very large enterprises (VLEs).