LATEST INTELLIGENCE
PRESENTED BY
ADDRESSING THE THREAT WITHIN:
RETHINKING NETWORK SECURITY
DEPLOYMENT
C
yber security breaches are happening
at an industrial scale. The unabated
volume of cyber breaches along with
the scale and magnitude of the breaches is
forcing the entire industry to re-think how
cyber security gets deployed, managed and
addressed. At the heart of this change is a
fundamental shift in the assumptions and
the model under which cyber security has
been operating.
Download whitepaper here
14
INTELLIGENTCIO
The traditional model was one that operated
under simple assumptions. Those assumptions
led to deployment models which in todays’
world of cyber security have been proven to be
woefully inadequate at addressing malware
and cyber breaches.
Some of these are outlined below:
• Perimeter Based Security: The traditional
cyber security trust model was based on
simplistic assumptions of creating a perimeter
and ensuring that what was outside the
perimeter was unsafe and what was inside
was considered secure. That perimeter security
typically consisted of a firewall at the internet
edge and endpoint security software such
as an antivirus solution, at the user end.
However, most of the perimeter firewalls and
endpoint security software solutions leverage
rules and signatures to identify malware. In
today’s world, many of the cyber breaches
exploit zero-day vulnerabilities.These are
vulnerabilities that have been detected but
for which no patches exist in various pieces of
software or for which no signature or rule exists
as yet. Consequently it is increasingly difficult
for traditional perimeter-based solutions to
prevent malware and threats from breaking in.
www.intelligentcio.com