As Threats Become Increasingly Severe and
Complex, Enterprises Should Consider an Intelligent Hybrid Security
Strategy
“Cybercriminals have been trying to gain access to protected networks since the dawn of the Internet,” said Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS. “In response, security teams implement counter-measures to try and keep them at bay – like anti-virus, DDoS defenses, intrusion preventions systems, web application firewalls, and a host of other security technologies. This segmented approach has led to visibility tools like log aggregators, SIEMs, and traffic analyzers – but has proven to be a poor attempt to get a holistic look at the threat landscape. In reality, these solutions have created security silos that require specialized teams, and result in a limited, expensive and ineffective approach to security.”
NSFOCUS advises enterprises to move toward an intelligent hybrid security model by taking the following steps:
- Automate Threat Intelligence: Consume real-time global threat intelligence and put it into action across all of the security technologies deployed within the enterprise, in an automated fashion that requires no human interaction.
- Eliminate Silos with Integrated Defenses: Deploy defenses that interoperate with and are fully aware of the other defenses in place, communicating vertically with the cloud and laterally across the entire enterprise, helping eliminate security silos and fragmented approaches.
- Identify Security Blind Spots: Implement closed-loop threat intelligence feedback for both cloud and on-premises defenses that removes blind spots and significantly reduce the time from measure to counter-measure, infection to detection.
- Take an Intelligent Look across the Network: Execute on a vision of an intelligent ecosystem of threat-aware solutions combined into a single entity that dramatically increases the visibility of the entire network and application landscape in the enterprise.
- Implement an Intelligence-Enabled Enterprise Security Platform: This platform allows organizations to upload all of their proprietary and additional third-party threat feeds into a comprehensive reporting and analysis solution..
No comments:
Post a Comment