point

February - 2015 - issue > CXO View Point

Tackling Enterprise Security Through a Continuous Approach

Sumedh Thakar
CXO-Qualys
Thursday, February 5, 2015
Sumedh Thakar
One of the things I get asked about most in my role, are my thoughts on challenges and trends driving the security market. The security industry is full of challenges that are shaping the trends of tomorrow. Globalization of the workplace, the Internet of Things, and the sheer speed at which we do business, makes it difficult to keep up with ever-evolving cyber threats and ensure an organization's overall security posture. One of the best ways to tackle these challenges is by taking a proactive, continuous approach to security. It is just not good enough anymore to look at security every once in a while. Attackers are targeting networks nonstop and hence the response of the enterprise has to be that of continuous security.

Closing the Door on Cyber Threats
Imagine you have a large house and that is your network. Every time you open a door or window there is possibility of an attacker coming in. Now imagine multiple people inside your house were opening and closing the doors and windows all day long. How can you maintain control of what's entering your house if you only checked for open doors and windows once a week? The situation with cyber security is exactly the same. You need to continuously monitor your perimeter to ensure you can track every firewall change that is made or every new device that is exposed to the internet so you can find and fix the issues before the attackers can.
As more technologies move to the cloud, more devices become connected, which means more endpoints are being added to networks faster than ever before. For hackers, more endpoints mean more doors and windows to open and exploit.
Many organizations are looking to continuous security as a means of added protection to monitor their ever-expanding network perimeters. But what is continuous security and how do you do it effectively?
If you look at some of the most recent cyber attacks, most cyber criminals are scanning and attacking on a continuous basis. Vulnerable machines can be exploited within hours. Toxic combinations of scenarios that can lead to compromises in their IT environments such as zero-days and phishing scams can expose an organization's data in an instant.

Protecting the Perimeter
Organizations perimeters today are very distributed, complex and highly dynamic. There are often various operations teams managing firewalls, load balancers, systems, applications and databases, making frequent changes to a network environment independent of one another.

Share on Twitter
Share on LinkedIn
Share on facebook