The threat landscape is more complicated than ever
In the entire scope of security we often include money, technology, processes, premises and people. For technology there is a fairly common understanding of the layers involved in a typical stack and these layers all need to consider security in their design and development.
Within the technology framework there are also subcategories for hardware and network equipment that need management and patching. While this creates an administrative burden, it is the responsibility of individuals and if the time is planned it can be managed more easily. What is harder to manage is the behaviour of your users and that of thieves targeting your organization.
With a massive upward trend of connected devices and shadow IT combined with increasing threats fueled by a profit motive, a defence in depth strategy is necessary. Organizations benefit from multiple tools because the hackers are motivated to deploy their own multi-vector frameworks.