The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 39
so that the MPLS backhaul could be
reduced.
Moreover, there are a significant
number of cases, where the
traffic under inspection lacks
critically important firewall and
endpoint protection capabilities
like intrusion prevention, SSL
decryption and malware detection
and response. Consequently,
malware and other attack vendors
will find it easy to compromise
the security in remote sites thus
infiltrating avenues for threats
to reach and propagate inside an
organisation.
Lack of Proper Scrutiny
at Endpoint Threats
Presently, hackers prefer to
conduct lateral attacks that spread
from infected endpoints across the
network. This has come to become
a widely preferred technique by
most hackers. As soon as they
infiltrate the network, they use
their malware in order to find other
vulnerable devices and exfiltrate
data. However, lateral threats
can be contained and stopped
from spreading further if systems
possess the capability to detect and
quarantine compromised devices.
Inadequate Network
Segmentation
It’s a tough job to secure traffic
between workstations or other
endpoints. Whenever, a threat
or malware compromises a
workstation, it’s not long before the
problem affects other endpoints
throughout the organisationas
well. Network modernisation
implementations need to have the
visibility that offers them a look
into the traffic and segmentation
aspects in order to contain threats
as soon as they enter the network.
Expanding the Area of
Security Surface
As many SD-WAN products and
services are devoid of better
security capabilities, firms need
to add multi-factor authentication
along with next-generation
firewalls and endpoint protection.
They also need to take care of their
branch offices and mobile workers
by adoptingcloud-based firewalls,
strong VPN, and authentication
protocols. With SD-WAN, firms
can avoid backhauling traffic to
headquarters and route them to the
internet instead of branch offices
thus ensuring reduced security
risks and encrypted network
connections.
SR
APRIL 2019
39