Intelligent CIO Africa Issue 03 | Page 10

LATEST INTELLIGENCE
PRESENTED BY

ADDRESSING THE THREAT WITHIN : RETHINKING NETWORK SECURITY DEPLOYMENT

Download whitepaper here

Cyber security breaches are happening at an industrial scale . The unabated volume of cyber breaches along with the scale and magnitude of the breaches is forcing the entire industry to re-think how cyber security gets deployed , managed and addressed . At the heart of this change is a fundamental shift in the assumptions and the model under which cyber security has been operating .

The traditional model was one that operated under simple assumptions . Those assumptions led to deployment models which in todays ’ world of cyber security have been proven to be woefully inadequate at addressing malware and cyber breaches . Some of these are outlined below :
• Perimeter Based Security : The traditional cyber security trust model was based on simplistic assumptions of creating a perimeter and ensuring that what was outside the perimeter was unsafe and what was inside was considered secure . That perimeter security typically consisted of a firewall at the internet edge and endpoint security software such as an antivirus solution , at the user end . However , most of the perimeter firewalls and endpoint security software solutions leverage rules and signatures to identify malware . In today ’ s world , many of the cyber breaches exploit zero-day vulnerabilities . These are vulnerabilities that have been detected but for which no patches exist in various pieces of software or for which no signature or rule exists as yet . Consequently it is increasingly difficult for traditional perimeter-based solutions to prevent malware and threats from breaking in .
10 INTELLIGENTCIO www . intelligentcio . com