Intelligent CIO Middle East Issue 17 | Page 14

LATEST INTELLIGENCE PRESENTED BY ADDRESSING THE THREAT WITHIN: RETHINKING NETWORK SECURITY DEPLOYMENT C yber security breaches are happening at an industrial scale. The unabated volume of cyber breaches along with the scale and magnitude of the breaches is forcing the entire industry to re-think how cyber security gets deployed, managed and addressed. At the heart of this change is a fundamental shift in the assumptions and the model under which cyber security has been operating. Download whitepaper here 14 INTELLIGENTCIO The traditional model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be woefully inadequate at addressing malware and cyber breaches. Some of these are outlined below: • Perimeter Based Security: The traditional cyber security trust model was based on simplistic assumptions of creating a perimeter and ensuring that what was outside the perimeter was unsafe and what was inside was considered secure. That perimeter security typically consisted of a firewall at the internet edge and endpoint security software such as an antivirus solution, at the user end. However, most of the perimeter firewalls and endpoint security software solutions leverage rules and signatures to identify malware. In today’s world, many of the cyber breaches exploit zero-day vulnerabilities.These are vulnerabilities that have been detected but for which no patches exist in various pieces of software or for which no signature or rule exists as yet. Consequently it is increasingly difficult for traditional perimeter-based solutions to prevent malware and threats from breaking in. www.intelligentcio.com