siliconindia | | August 20199of cyber-attackers, which are often dynamically tweaked in real-time (or near real-time). With this in mind, a com-pany's defenses must be able to respond at least as quick-ly as the hackers can attack.Secondly, a cybersecurity platform must integrate all the different security tools and systems in a service pro-vider's armory ­ all of which generates a huge number and variety of alarms. As a result, the time it takes to re-spond and begin the fight back against a hacker will be reduced by having a centralized, single view for orches-trating the entire security environment, supported by data analytics to identify real threats from false alarms.In particular, automation is vital to increase the speed of response and to tackle the growing workload facing security teams ­ such as the amount of incident response time spent on manual processes (i.e. 33 percent). It won't be a surprise then to know that manual processes simply cannot be scaled-up to meet the rise in threats that will inevitably accompany the growth in 5G business.Keep it MovingWhen it comes to rapidity, one of the most important se-curity success factors is reducing the `dwell' time. Dwell time is the length of time a hacker goes undetected, if they're able to breach first-line security in order to gain access to the network. While an effective first-line de-fense of firewalls and other measures will stop nearly all hackers before they can even get into a network, a few attacks will inevitably get through, given the amount of times a network deflects attempted breaches around the world. However, with rapid, automated and smart detec-tion response, even these breaches can be tackled to pro-tect customer data. This is tied to dwell time. The longer amount of time a hacker is able to dwell in a network undetected, the more chances they have to hunt around for valuable data to steal. Similar to a home burglary, the longer an intruder is able to sneak around a house before the cops are called, the more likely they are to find hidden valuables such as a safe. The moment a burglar hears a police siren however, they begin to flee ­ or at least are cut short in the amount of items they're able to snatch. In the same way, once a hacker knows an alarm has been triggered, they know their attack time is rapidly com-ing to an end. From here, even if they keep mining for data, hackers know they'll only be able to leave with so much before they're caught. Because of this, adaptabil-ity, analytics, machine learning, orchestration and auto-mation act as a secondary line of defense if an attacker is able to breach the first defenses ­ as these technolo-gies working together can cut a hacker's dwell time by as much as 80 percent.End-to-end 5G security is able to deploy all of these measures, and exploring flexible security options doesn't need to wait for 5G rollout to begin. Together, these ca-pabilities can help digital service providers to build trust in their customers today and ensure exciting, new 5G services are as secure as possible. In today's digital world, the more trust a user has in a service, the more likely they are to buy it. At the same time, digital ser-vice providers are able to monetize their investment in security through the provision of cloud-based managed security services. The longer amount of time a hacker is able to dwell in a network undetected, the more chances they have to hunt around for valuable data to stealAmit Marwah
< Page 8 | Page 10 >