Intelligent CISO Issue 33 | Page 42

This presents many problems for security professionals – an eclectic carnival of devices , a vast attack surface , a lack of control over all of it and , of course , rising expectations .
EXPERT OPINION important in delivering such capabilities , and the most practical and obvious place to find this responsiveness is in the cloud .
Real-time visibility ensures that you can manage the complexity of an environment where attacks can come from anywhere ( a multi-vector response ). In a world where the endpoint has become the new perimeter , users are now an even weaker link than before . A careless click or a thoughtless swipe and you may be dealing with a showstopping data exfiltration .
Weeding the garden
But you just as commonly may be dealing with a dismissible relic – an old penetration method fruitlessly seeking to exploit a long-patched software vulnerability . Your problem , if you run a patchwork of vendor solutions , is that you cannot tell the difference . But with a unified , cloud-based threat assessment , your cloud ‘ brain ’ has already decided your response , presenting a high-level view ( with granular drilldown options ) only of those risks classified as both new and potentially hazardous . This saves your tech team hours of combing disparate dashboards , reports and data logs trying to figure out if , and when , they should act .

This presents many problems for security professionals – an eclectic carnival of devices , a vast attack surface , a lack of control over all of it and , of course , rising expectations .

Vulnerability management is handled similarly in such unified solutions . Not every vulnerability requires direct and time-consuming action . By maintaining a robust asset registry , the cloud brain can keep tabs on what critical upgrades are required on which machines and very often apply them without the need for manual intervention .
Yet more time is saved . And vulnerability management , detection and response ( VMDR ), endpoint detection and response ( EDR ) and network security are all bundled within the same solution , so policies can be set by security teams that are unified with those of other technology teams and allow an organisation-wide stand against bad actors that recognises and accommodates all of your business ’ goals .
Freeing up responders
When all points of defence are coordinated in such a tightly unified model , response capabilities are consequently sharpened . Instantaneous action now
42 www . intelligentciso . com