Intelligent CIO APAC Issue 04 | Page 54

FEATURE : THREAT ASSESSMENT
Why intrinsic security is so important
But even before COVID-19 hit us , there was no doubt that attacks are becoming increasingly sophisticated . Our own research , through our Global Threat Report series , informed us that the number of cyberattacks , breaches and the sophistication of attacks are higher than ever .
Today , increasingly elegant attack platforms and techniques are being shared among the criminal community and the infosec industry is not responding fast enough . Part of the problem is that too many products and agents deployed across an organization make security management complex .
Security does not need another new product , it needs an innovative approach , one that combines visibility into apps , networks , users and devices with advanced threat detection and response to deliver a unique intrinsic security approach .
What we are also seeing as a result of COVID-19 , is that users are having to defend themselves at home and actions taken to ensure Business Continuity and resiliency only increase the attack surface . So how do we retrofit security on to that ? The simple answer is that we cannot – it needs to be built-in . . . and back to my earlier point – it needs to be intrinsic .
Earlier in the year we attended the RSA Conference and unveiled our vision for intrinsic security , a safer , more effective security built into the fabric of the various infrastructure control points that are vulnerable to attack ( endpoint , identity , network , cloud , workload and so on .)
Here at VMware Carbon Black , we believe that by building security intrinsically into the fabric of the enterprise – across applications , clouds and devices – teams can significantly reduce the attack surface , gain greater visibility into threats and understand where security vulnerabilities exist .
Rick McElroy , Cyber Security Strategist at VMware Carbon Black
But in parallel to this , security teams must also work in tandem with the business to shift the balance of power from attackers to defenders . They must collaborate with IT teams and work to remove the complexity
54 INTELLIGENTCIO www . intelligentcio . com