THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

Similar documents
WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

THALES DATA THREAT REPORT

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Keys to a more secure data environment

THALES DATA THREAT REPORT

Integrated Access Management Solutions. Access Televentures

DDoS MITIGATION BEST PRACTICES

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Build Your Zero Trust Security Strategy With Microsegmentation

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Making the case for SD-WAN

Best Practices in Securing a Multicloud World

align security instill confidence

HEALTHCARE IT NETWORK SURVEY REPORT

Data center interconnect for the enterprise hybrid cloud

Toward an Automated Future

Redefining Networking with Network Virtualization

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Cisco Start. IT solutions designed to propel your business

Mastering The Endpoint

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

WHITE PAPER. Applying Software-Defined Security to the Branch Office

to Enhance Your Cyber Security Needs

INTELLIGENCE DRIVEN GRC FOR SECURITY

AKAMAI CLOUD SECURITY SOLUTIONS

Preparing your network for the next wave of innovation

Enabling Innovation in the Digital Economy

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Securing Your Digital Transformation

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Security Automation Best Practices

Cloud Computing: Making the Right Choice for Your Organization

DIGITAL TRUST Making digital work by making digital secure

NEXT GENERATION SECURITY OPERATIONS CENTER

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

HOSTED SECURITY SERVICES

The Top 6 WAF Essentials to Achieve Application Security Efficacy

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

IT Security: Managing a New Reality

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

Securing intelligent networks: a guide for CISO and CIOs

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

An ICS Whitepaper Choosing the Right Security Assessment

FOR FINANCIAL SERVICES ORGANIZATIONS

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

Security-as-a-Service: The Future of Security Management

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

AT&T Endpoint Security

CYBER INSURANCE: MANAGING THE RISK

How Network Security Services Work to Protect Your Business

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Choosing the Right Security Assessment

Angela McKay Director, Government Security Policy and Strategy Microsoft

ACHIEVING FIFTH GENERATION CYBER SECURITY

Symantec Security Monitoring Services

SECURITY SERVICES SECURITY

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

2015 VORMETRIC INSIDER THREAT REPORT

External Supplier Control Obligations. Cyber Security

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Retail Security in a World of Digital Touchpoint Complexity

HEALTH CARE AND CYBER SECURITY:

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

Security in India: Enabling a New Connected Era

CA Security Management

RSA INCIDENT RESPONSE SERVICES

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

SIEM: Five Requirements that Solve the Bigger Business Issues

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Nine Steps to Smart Security for Small Businesses

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

RSA INCIDENT RESPONSE SERVICES

Security. Made Smarter.

KEYCLOUD BACKUP AND RECOVERY AS-A-SERVICE (BRAAS): A fully-managed backup and recovery solution for your mission critical data

Trend Report. Network Security: What IT Decision Makers Really Think

Cybersecurity. Securely enabling transformation and change

Evolve Your Security Operations Strategy To Account For Cloud

Transcription:

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

CONTENTS EXECUTIVE SUMMARY HANDLING CONFLICTING RESPONSIBILITIES WITH CARE DIGITAL TRANSFORMATION CREATES NEW SECURITY CHALLENGES RESOURCE LIMITATIONS AMPLIFY A COMPANY S EXPOSURES 1 2 3 5

EXECUTIVE SUMMARY Security and network engineering IT leaders face various juxtaposed challenges that are difficult to reconcile. As companies undergo digital transformation, their attack surface balloons. Branch networks, cloud technologies, the Internet of Things (IoT), and other technological developments exacerbate complexity in security management. But security products designed to mitigate threat risk may impede network performance. IT leaders are responsible for balancing these competing priorities. Decisions around this balancing act become even more complicated for IT departments operating within tight budget constraints and facing staffing challenges. 1 THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

01 HANDLING CONFLICTING RESPONSIBILITIES WITH CARE Those responsible for corporate network security are perched carefully, perhaps tenuously, on a balance beam. On one side, you shoulder expectations that your network and applications remain available 24x7 while at the speeds corporate stakeholders have come to expect. On the other side, you re carrying responsibility for uncovering and mitigating all network vulnerabilities. The staff, processes, and software infrastructure you ve set up prevent breaches or intrusions that could cause data loss and downtime. The same structures also determine how effectively your company mitigates the effects of any security threats that get past corporate defenses. Balancing network performance against security concerns is challenging in any circumstance. It becomes even more difficult, however, as companies undergo digital transformation, incorporating technologies such as the cloud and IoT devices into day-to-day activities and connecting them to the corporate network. Effectively protecting your company s digital assets, without compromising network performance, requires careful evaluation and balancing of requirements. In a recent survey of IT professionals, 56% indicate their companies have not updated their information security models in the last three years. 1 This comes as a bit of a surprise due to the digital changes organizations are experiencing and the evolution of the threat landscape. As you plan your approach for walking the balance beam of conflicting responsibilities, it s crucial to keep in mind the new security challenges posed by these new digital technologies. 1 Pete Bartolik, To Err Is Human: Solving Today s Real Cyber Security Challenge, CIO, January 16, 2018. 2 THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

02 DIGITAL TRANSFORMATION CREATES NEW SECURITY CHALLENGES As your company introduces new classes of digital technologies to its network, it also creates new attack vectors for cybercriminals. This technological transformation requires you to simultaneously undertake a security transformation. Corporate networks today look very different from a decade ago. Some businesses that operate in multiple locations have implemented software-defined wide area networks (SD-WAN) to unlock connectivity among branches. The goal is to avoid expensive backhaul from branches on the network by utilizing cheaper Internet links between locations. But those Internet connections are inherently less secure. On top of that, companies usually provide much of their branches security from the data center, and this protection is lost with SD-WAN capabilities, where network traffic bypasses the security protocols of the corporate data center. Properly protecting systems in an SD-WAN environment, while maintaining the application and network performance gains that the technology offers, requires a fresh approach to network security. Likewise, security challenges are compounded by cloud adoption. A full 95% of businesses rely on cloud-based applications or infrastructure, and the average company runs 16 different Softwareas-a-Service (SaaS) applications. But these solutions run outside the company s usual IT security processes. Effective protection for cloud applications and data requires a new type of security solution. Meanwhile, many organizations are incorporating IoT technologies into their offices, factories, medical devices, and control systems, among others. Such technologies can dramatically improve operational efficiency and deliver valuable business intelligence. However, their open access to networks creates vulnerabilities that conventional security approaches are not prepared to protect against. For example, hackers at the 2016 DEF CON security conference revealed 47 new vulnerabilities affecting 23 devices from 21 manufacturers. Participants found ways to remotely unlock IoTenabled locks, physically damage solar arrays, and spy on people, among other exploits, all during the event s four days. The pervasiveness of mobile technologies adds one more realm of complexity to your organization s security profile. Mobile devices are generally not provided or managed by the corporate IT group, so the company has no way of ensuring that they have adequate security controls. As your corporate network needs to accommodate more and more mobile devices for employees, customers, suppliers, and others the security practices that were effective prior to digital transformation will prove inadequate. 2 2017 State of the Cloud Report, RightScale, January 2017. 3 2017 State of the SaaS-Powered Workplace, accessed March 12, 2018. 4 Lucian Constantin, Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON, CSO, September 13, 2016. 3 THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

ATTACK SURFACE IS EXPANDING RAPIDLY All these trends add up to an attack surface that is rapidly growing, both in breadth and complexity. At the same time, your organization s executives and board have probably not relaxed their security expectations as the IT environment has evolved, nor have regulatory compliance requirements slackened. They expect you to have the right security technologies and processes in place to prevent any data breach or other security event that might have costly financial or reputational ramifications. And whatever technologies your company may begin to offer, end users will expect to be able to work as quickly as they have in the past. Like IT leaders around the world, you re probably feeling the tension between security and performance, which tends to ratchet up in periods of rapid technological change. ACCELERATED RESPONSE IS DIFFICULT, IF NOT IMPOSSIBLE, WITH POINT PRODUCTS What your staff needs in this era of tight intrusion-to-breach windows and expanding attack surfaces is at-a-glance visibility, in real time, into threats and vulnerabilities companywide. That is not what they get at least, not easily if you invest in separate point products to deal with each new risk vector. Your organization might, for example, purchase one product to secure the network s mobile access points. You might buy a different product to protect cloud-based data. And your organization might use separate software to mitigate threats to its data center, email server, and end-user web browsers. Each of these security products might be best-of-breed in its niche. But if the systems don t integrate tightly, they limit your staff s ability to see and deal with security concerns. In addition, when products fail to automatically share vital information, they slow down detection of vulnerabilities and threats across the corporate attack surface. Perhaps this is why cyber criminals have a median of 65 days to wreak havoc before their data breach is detected. 5 Manually consolidating data from different systems reports or log files takes time. Here, a security architecture that relies on manual data consolidation is going to be much less successful protecting against polymorphic attacks that employ several different attack vectors simultaneously. 5 2017 Trustwave Global Security Report, Trustwave, June 2017. 4 THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

03 RESOURCE LIMITATIONS AMPLIFY A COMPANY S EXPOSURES Corporate networks may be growing more complex, but IT security budgets remain flat. Focusing on efficiency, rooting out manual processes and integrating products wherever possible, is crucial as you increasingly need to stretch your security budget and staff. Your costs may rise during digital transformation because purchasing several unrelated pieces of security software may be expensive. And those cost concerns may be exacerbated by the additional staff needed to manage the different systems. Not only that, but in many markets, security skills are hard to come by at any price. If your company chooses to run an assortment of different products, you ll be tasked with not only finding, but also retaining, employees with expertise in each of those solutions. Even worse, time that your security team spends sorting and consolidating data from disparate systems is time lost to more valueadded activities. A set of integrated solutions that automatically provided you with a companywide view of the organization s security posture frees up staff time for patching vulnerabilities, responding to intrusions, mitigating threats, and analyzing opportunities to enhance security processes. BALANCING COMPETING DEMANDS TO BUILD SECURE, YET EFFICIENT, SECURITY ARCHITECTURES The bottom line is that the more security systems you integrate, the more efficiently your IT security function will run. As you consider options for securing corporate data and applications, from your perch on the balance beam of your digitally transformed organization, demand a consolidated view of threats and vulnerabilities across the company s entire attack surface. Make sure the security and network products and solutions you re considering enable your organization to centralize controls from the perimeter firewall to application and cloud security software and everything in between. Across all your company s potential threat vectors, look for security solutions that share data freely. Better yet, look for solutions that access the same, reputable advanced threat intelligence. 5 THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

www.fortinet.com Copyright 2018 Fortinet, Inc. All rights reserved. 04.11.18 179492-B-0-EN