latest intelligence
ADDRESSING THE
THREAT WITHIN:
RETHINKING NETWORK
SECURITY DEPLOYMENT
I
Introduction
Cybersecurity breaches are happening
at an industrial scale. The unabated
volume of cyberbreaches along with the
scale and magnitude of the breaches
is forcing the entire industry to re-
think how cybersecurity gets deployed,
managed and addressed.
PRESENTED BY
At the heart of this change is a
fundamental shift in the assumptions and
the model under which cybersecurity
has been operating. The traditional
model was one that operated under
simple assumptions.
DOWNLOAD WHITEPAPERS AT:
WWW.INTELLIGENTCISO.COM/
WHITEPAPERS
Those assumptions led to deployment
models which in today’s world of
cybersecurity have been proven to
be woefully inadequate at addressing
malware and cyberbreaches. Some of
these are outlined below:
Perimeter based security: The traditional
cybersecurity trust model was based
16
on simplistic assumptions of creating a
perimeter and ensuring that what was
outside the perimeter was unsafe and
what was inside was considered secure.
That perimeter security typically
consisted of a firewall at the Internet
edge and endpoint security software,
such as an antivirus solution, at the user
end. However, most of the perimeter
firewalls and endpoint security software
solutions leverage rules and signatures
to identify malware.
In today’s world, many of the
cyberbreaches exploit zero-day
vulnerabilities. These are vulnerabilities
that have been detected but for which
no patches exist in various pieces of
software or for which no signature or
rule exists as yet.
Consequently, it is increasingly difficult
for traditional perimeter-based solutions
to prevent malware and threats from
breaking in. u
Issue 11
|
www.intelligentciso.com