PUBLICATION & RESEARCH LIBRARY

Authors: Jason Pappalexis, Mike Spanbauer and John Whetstone

Publish Date: October 8, 2017

Threat actors are demonstrating the ability to bypass protection offered by conventional endpoint and perimeter security solutions. In turn, enterprises must evolve their network defenses to incorporate a different kind of protection, one that NSS Labs defines as a breach detection system (BDS). Although initially exclusive to large or very large enterprises, the use of BDS has begun to move down-market into small and medium-sized enterprises.

Enterprises can use this information to gain critical insights into the purpose and use of BDS technology. These insights include information on how this security control is being managed within organizations, where it is being deployed, who is responsible for purchasing decisions, and the extent to which API controls are being used for its management.

Part of a series on security controls deployed by US enterprises, this brief includes current usage statistics for BDS within small and medium-sized enterprises (SMEs), large enterprises (LEs), and very large enterprises (VLEs).