{"id":400,"date":"2017-05-08T14:13:49","date_gmt":"2017-05-08T14:13:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/a-single-protective-technology-means-a-single-point-of-failure\/"},"modified":"2019-05-29T12:19:30","modified_gmt":"2019-05-29T12:19:30","slug":"a-single-protective-technology-means-a-single-point-of-failure","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/","title":{"rendered":"A single protective technology means a single point of failure"},"content":{"rendered":"<p class=\"wls-paragraph\">How would you protect your own home? Would you invest in only one of the following: a strong fence, a set of security cameras, a very loud alarm, or motion detectors to monitor dark corners? Or would you rather use all of these to improve protection? Keeping your business network safe requires similar questioning. Using a security system based on a single type of technology is a good start, but what will stop cybercriminals from stealing valuable information if they find a way to bypass that?<\/p>\n<p><span class=\"block_quote_right\">\u201cA company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">A company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies with high detection rates and a low number of false positives. In other words, one that catches thieves but doesn\u2019t react when a neighbor\u2019s cat walks across the lawn.<\/p>\n<p class=\"wls-paragraph\">Both malicious code and malicious activity can take several forms, but often&nbsp;what they both have in common is their effort to stay under the radar of implemented security solutions. Malware creators go to great lengths to pursue this aim, and their methods evolve in step with advances in cybersecurity.<\/p>\n<p class=\"wls-paragraph\">Nevertheless, some <a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">post-truth vendors<\/a> argue that to counter all cyberthreats, companies only need a single layer of protection that uses the \u201clatest\u201d machine learning algorithm. No updates, no cloud and no pointless extra layers. Naturally, this single-layer solution is the product they offer.<\/p>\n<p class=\"wls-paragraph\">Despite the latest advances in AI, which have been achieved primarily by large players such as Google, Facebook and Microsoft, even the most recent cybersecurity algorithms do not amount to a silver bullet against all threats. In fact they offer only a single further step that can improve endpoint security, but can also be easily overpowered by adversaries when complementary security systems are absent.<\/p>\n<p class=\"wls-paragraph\">While overcoming a single layer can lead to an infection, multiple barriers that are able to detect malicious items, even when modified, make attacks more difficult and more costly, forcing adversaries to laboriously change the behavior of their code.<\/p>\n<h2><strong>Why more is better<\/strong><\/h2>\n<p class=\"wls-paragraph\">Company networks are similar to complicated organisms. They consist of various nodes \u2013 organs \u2013 each assigned a different role, importance and rights. Identifying malicious activity in such a complex system can prove messy and difficult, especially if the protection solution is trying to track everything through a single point.<\/p>\n<p class=\"wls-paragraph\">It is true that a strong perimeter can improve a business\u2019s cybersecurity, thus freeing endpoints from constant scanning of every item for malicious activity. However, if it\u2019s the only protective barrier for attackers to overcome, once they succeed there is nothing further to stop them.<\/p>\n<p><span class=\"block_quote_right\">\u201cWith multi-layered solutions, even if one technology is bypassed, an array of other technologies remains to take action at a later point, or in a specific situation.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">Remember, avoiding protection solutions is a cybercriminal\u2019s daily bread and, as has been proved again and again in the past, any feature or system can be circumvented given enough effort. With multi-layered solutions, even if one technology is bypassed, an array of other technologies remains to take action at a later point, or in a specific situation.<\/p>\n<p class=\"wls-paragraph\">So even if malware is stealthy enough to avoid detection in an email, it doesn\u2019t mean that it will not get blocked and deleted later, when it tries to wreak havoc in the system\u2019s memory. The same goes for a malicious code betting on a delay in its fraudulent activities to elude detection, or sitting in a system for several months while waiting for a specific file-type to trigger the next malicious processes.<\/p>\n<h2><strong>Even a smart machine can be fooled<\/strong><\/h2>\n<p class=\"wls-paragraph\">Many of the post-truth vendors argue that their solutions work on a different basis. They say that their machine learning solutions are able to learn locally and uncover many of the techniques used by attackers. But the truth is that most cybercriminal methods evolve \u2013 and can be sophisticated enough to fool even the newest so-called smart machines.<\/p>\n<p><span class=\"block_quote_right\">\u201cThe truth is that most cybercriminal methods evolve \u2013 and can be sophisticated enough to fool even the newest so-called smart machines.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">To name just a few examples, let\u2019s look at steganography. Attackers just need to take malicious code and smuggle it into harmless files such as pictures. By burying it deep into a <a href=\"http:\/\/www.welivesecurity.com\/2016\/12\/06\/stegano-exploit-kit\/\" target=\"_blank\" rel=\"noopener noreferrer\">pixel setting<\/a>, the machine can be fooled by the (infected) file, which is now almost indistinguishable from its clean counterpart.<\/p>\n<p class=\"wls-paragraph\">Similarly, fragmentation can also lead to a detection algorithm returning an incorrect evaluation. Attackers split the malware into parts and hide it in several separate files. Each of them is clean on its own; only at the moment when they all converge on one endpoint or network do they begin to demonstrate malicious behavior.<\/p>\n<p class=\"wls-paragraph\">With only one layer of monitoring, such activity can go unnoticed, as the \u201csmart\u201d algorithm would require more complex optics to see the whole problem. Using multiple technologies, combined with global context and updates, can offer the necessary big picture view and successfully block even new and sophisticated attempted attacks.<\/p>\n<h2><strong>Why not block these techniques?<\/strong><\/h2>\n<p class=\"wls-paragraph\">While the approach described above can be used for malicious aims, they are perfectly legitimate in other contexts. Every business client is different and endpoints can have very diverse settings. Some companies, for example, use software or files that look very suspicious but are entirely legitimate for their purposes.<\/p>\n<p class=\"wls-paragraph\">Sure, if you are a small cybersecurity vendor with a user base of tens of thousands or maybe hundreds of thousands of endpoints, you can contact those few who might encounter some issues. But what if the number grows to tens, or hundreds of millions?<\/p>\n<p class=\"wls-paragraph\">Only years of experience and testing can prove how best to fine-tune solutions to suit such a significant group of business clients. Similarly, it takes an investment of years to devise the protective layers that proactively help outsmart cybercriminals and protect today\u2019s masses of internet users.<\/p>\n<p class=\"wls-paragraph\">Analysts in the field of cybersecurity have also come to see the problems associated with using only a single protection technology and advise caution when choosing between so-called \u201cnext-gen\u201d and established vendors, citing the first as complementary \u2013&nbsp;but not an alternative \u2013 to the latter.<\/p>\n<p class=\"wls-paragraph\">The whole series:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: Fighting post-truth with reality in cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/12\/dont-buy-elixir-youth-machine-learning-not-magic\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is machine learning and artificial intelligence?<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/18\/pr-reality-collide-truth-machine-learning-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Most frequent misconceptions about ML and AI<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/25\/machine-learning-math-cant-trump-smart-attackers\/\">Why ML-based security doesn\u2019t scare intelligent adversaries<\/a><\/li>\n<li>Why one line of cyberdefense is not enough, even if it\u2019s machine learning<\/li>\n<li>Chasing ghosts: The real costs of high false positive rates in cybersecurity<\/li>\n<li>How updates make your security solution stronger<\/li>\n<li>We know ML, we\u2019ve been using it for over a decade<\/li>\n<\/ol>\n<p class=\"wls-paragraph\"><strong><em>With contribution of Jakub Debski &amp; Peter Kosinar<\/em><\/strong><\/p>\n<p class=\"wls-paragraph\" style=\"text-align: left;\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/02\/single-protective-technology-means-single-point-failure\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How would you protect your own home? Would you invest in only one of the following: a strong fence, a set of security cameras, a very loud alarm, or motion detectors to monitor dark corners? Or would you rather use all of these to improve protection? Keeping your business network safe requires similar questioning. Using<\/p>\n","protected":false},"author":5,"featured_media":1801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A single protective technology means a single point of failure - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A single protective technology means a single point of failure\" \/>\n<meta property=\"og:description\" content=\"How would you protect your own home? Would you invest in only one of the following: a strong fence, a set of security cameras, a very loud alarm, or motion detectors to monitor dark corners? Or would you rather use all of these to improve protection? Keeping your business network safe requires similar questioning. Using\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-08T14:13:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"A single protective technology means a single point of failure\",\"datePublished\":\"2017-05-08T14:13:49+00:00\",\"dateModified\":\"2019-05-29T12:19:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/\"},\"wordCount\":1142,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/05_WLS_multilayer-623x410.png\",\"articleSection\":[\"cybercrime\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/\",\"name\":\"A single protective technology means a single point of failure - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/05_WLS_multilayer-623x410.png\",\"datePublished\":\"2017-05-08T14:13:49+00:00\",\"dateModified\":\"2019-05-29T12:19:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/05_WLS_multilayer-623x410.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/05_WLS_multilayer-623x410.png\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A single protective technology means a single point of failure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/08\\\/a-single-protective-technology-means-a-single-point-of-failure\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A single protective technology means a single point of failure - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/","og_locale":"en_US","og_type":"article","og_title":"A single protective technology means a single point of failure","og_description":"How would you protect your own home? Would you invest in only one of the following: a strong fence, a set of security cameras, a very loud alarm, or motion detectors to monitor dark corners? Or would you rather use all of these to improve protection? Keeping your business network safe requires similar questioning. Using","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-05-08T14:13:49+00:00","article_modified_time":"2019-05-29T12:19:30+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"A single protective technology means a single point of failure","datePublished":"2017-05-08T14:13:49+00:00","dateModified":"2019-05-29T12:19:30+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/"},"wordCount":1142,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png","articleSection":["cybercrime"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/","name":"A single protective technology means a single point of failure - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png","datePublished":"2017-05-08T14:13:49+00:00","dateModified":"2019-05-29T12:19:30+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/05_WLS_multilayer-623x410.png","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"A single protective technology means a single point of failure"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/08\/a-single-protective-technology-means-a-single-point-of-failure\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=400"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1801"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}