Need for Network Security Devices if Antivirus Software can be used on PCs

Solved
Timc95
Here to help

Need for Network Security Devices if Antivirus Software can be used on PCs

If antivirus softwares are used to provide security to PCs from internet-related threats, then what is the need for an IPS/IDS or any other network security device on a network? Wouldn't an antivirus solution be sufficient to secure the endpoints from network-related attacks and viruses? If not, then why? Just a question that popped up in my mind.

 

Thanks for your response!

1 Accepted Solution
alemabrahao
Kind of a big deal
Kind of a big deal

Antivirus alone is not enough.

- Antivirus software is designed to protect individual devices, not the entire network.
- Antivirus relies on known malware signatures, which may not be effective against new or sophisticated attacks.
- Antivirus software doesn't monitor network traffic, leaving gaps in security that network-based attacks can exploit.


In summary, while antivirus software is crucial for endpoint protection, network security devices like IDS, IPS, and firewalls provide broader and more proactive defense mechanisms to secure the entire network from a variety of threats.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

View solution in original post

6 Replies 6
DarrenOC
Kind of a big deal
Kind of a big deal

Because you need as many layers of protection as possible.  Reverse the question- if we have firewalls with threat protection, IPS/IDS etc then why have endpoint protection?

Darren OConnor | doconnor@resalire.co.uk
https://www.linkedin.com/in/darrenoconnor/

I'm not an employee of Cisco/Meraki. My posts are based on Meraki best practice and what has worked for me in the field.
Mloraditch
Kind of a big deal
Kind of a big deal

Sometimes I find an analogy helps, in the spirit of May the 4th, I'll lay out this:  if the Emperor can Force Lightning you why does he have a royal guard and why does he live in a palace with several layers of security?

Layers of security.

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
PhilipDAth
Kind of a big deal
Kind of a big deal

Your car has a frontal crush zone to save you in an accident.  Why do you need seatbelts AND airbags?

Brash
Kind of a big deal
Kind of a big deal

I'm loving these metaphors 😆


But they're all correct, it's about having layers.

Nothing is impenetrable but if an attacker keeps coming up against more and more roadblocks, they're more likely to:

 - Be discovered and stopped before significant impact

 - Decide that it's not worthwhile persisting with an attack

 

Additionally different security products deliver different outcomes and source from different feeds.

alemabrahao
Kind of a big deal
Kind of a big deal

Antivirus alone is not enough.

- Antivirus software is designed to protect individual devices, not the entire network.
- Antivirus relies on known malware signatures, which may not be effective against new or sophisticated attacks.
- Antivirus software doesn't monitor network traffic, leaving gaps in security that network-based attacks can exploit.


In summary, while antivirus software is crucial for endpoint protection, network security devices like IDS, IPS, and firewalls provide broader and more proactive defense mechanisms to secure the entire network from a variety of threats.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
AmyReyes
Community Manager
Community Manager

Hi @Timc95, thank you for sharing this question with the community 😊 People are having some fun with the analogies, but all joking aside, you have gotten some good answers here. 

 

There is a fun blog post from Cisco that, while older (published in 2018), is still relevant and covers this very topic! Read the Layers of Security blog post here.

Get notified when there are additional replies to this discussion.