Every technology has its own limitation. Don’t just listen to Sales or look at Product Brochure. Their tactics are to highlight what are the strengths or success stories of the desirable protection scenarios and hide limitations.
There are many examples of limitations quoted in previous blogs:
- Is network anomalies detection able to spot “missing” but not extra among “unusual” traffic from baseline profile?
- Is company “authorized” USB drive effective for DLP or limiting malware?
- Is Touch ID really secure
- ,,, etc.
Understand the technology what works and what doesn’t. Set stake holders expectation for limitations and the required compensating controls. Voice these out before recommending the protection technology if really fit for adoption.