Top Five Reasons You Need an. Elemental Shift in Your Security

Similar documents
Security inside out. The top seven reasons to optimize your network security model with a security delivery platform. See what matters.

Rethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team

Rethinking Security: The Need For A Security Delivery Platform

Breaches are inevitable!

The Why, What, and How of Cisco Tetration

Aligning Agency Cybersecurity Practices with the Cybersecurity Framework

SOC AUTOMATION OF THREAT INVESTIGATION

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management

AKAMAI CLOUD SECURITY SOLUTIONS

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Product Brief GigaVUE-VM

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

WHITE PAPER. Applying Software-Defined Security to the Branch Office

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

RSA NetWitness Suite Respond in Minutes, Not Months

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

Securing Your Most Sensitive Data

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Best Practices in Securing a Multicloud World

Total Threat Protection. Whitepaper

The Cognito automated threat detection and response platform

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Cisco Start. IT solutions designed to propel your business

The threat landscape is constantly

Security-as-a-Service: The Future of Security Management

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

ForeScout ControlFabric TM Architecture

8 Must Have. Features for Risk-Based Vulnerability Management and More

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Why Converged Infrastructure?

Securing Digital Transformation

The Gigamon Visibility Platform

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

The security challenge in a mobile world

Why Enterprises Need to Optimize Their Data Centers

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

CSP 2017 Network Virtualisation and Security Scott McKinnon

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

Trends and Challenges We now live in a data-driven economy A recent Gartner report discussing NetOps 2.0 stated, NetOps teams must embrace practices a

Check Point 4800 with Gigamon Inline Deployment Guide

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

with Advanced Protection

CloudSOC and Security.cloud for Microsoft Office 365

Dell EMC Hyper-Converged Infrastructure

Agile Security Solutions

Vulnerability Management Trends In APAC

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Protecting Against Encrypted Threats

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Dell EMC Hyper-Converged Infrastructure

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

THE ACCENTURE CYBER DEFENSE SOLUTION

Security in India: Enabling a New Connected Era

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

WHITEPAPER. How to secure your Post-perimeter world

Solution Overview Gigamon Visibility Platform for AWS

BREAK THE CONVERGED MOLD

RSA INCIDENT RESPONSE SERVICES

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

RSA INCIDENT RESPONSE SERVICES

FOR FINANCIAL SERVICES ORGANIZATIONS

Build application-centric data centers to meet modern business user needs

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Sustainable Security Operations

Are we breached? Deloitte's Cyber Threat Hunting

SYMANTEC DATA CENTER SECURITY

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Spotlight Report. Information Security. Presented by. Group Partner

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

The Future of Network Infrastructure & Management

Data Privacy in Your Own Backyard

WHITE PAPER END-TO-END VISIBILITY: THE FOUNDATION OF BUSINESS-DRIVEN SECURITY THREAT DETECTION & RESPONSE OPTIMIZED SIEM

Popular SIEM vs aisiem

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

WHITEPAPER END-TO-END VISIBILITY: THE FOUNDATION OF BUSINESSDRIVEN SECURITY DETECTING AND RESPONDING TO THE THREATS THAT MATTER MOST TO THE BUSINESS

to Enhance Your Cyber Security Needs

Next Generation Privilege Identity Management

The definitive guide to selecting the right ADC for the digital transformation era

Cisco Cloud Application Centric Infrastructure

Cisco Tetration Analytics

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

Securing Your Amazon Web Services Virtual Networks

Next-Generation HCI: Fine- Tuned for New Ways of Working

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Build a Software-Defined Network to Defend your Business

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Transcription:

Top Five Reasons You Need an Elemental Shift in Your Security

It s Time for a New Vision of Network Security Securing an IT infrastructure across physical, virtual and cloud environments has become more daunting and complex than ever. The emergence of big data, the internet of things and machine-to-machine communications has not only produced increasing volumes of data and network speeds, but also an increasing number, variety and sophistication of critical threats, including cyberterrorism, malware, ransomware and those originating from inside your organization. Add those up and what do you get? A domain of ever-increasing complexity, risk and cost. So, when faced with the question of how well the status quo network security architecture serves your business and your customers and the answer is, not well enough, it s time for elemental shift in security. Today s threat environment demands change Data volume Network speeds Proliferating threats Complexity Risk Cost 2

CYBERTHREATS CONSTANTLY EVOLVE. Here are Five Reasons Your Defenses Should, Too. 3

REASON 1: Legacy Security Models Are No Match for Modern Threats Perimeter and Endpoint-Based Approaches Are Only the First Step Organizations have done what they re supposed to do: Deploy the latest firewalls and the most advanced intrusion detection systems. So why are breaches still happening? The answer is that security postures continue to rely on the same old principles. Today organizations need more than a collection of single-featured tools. The Simple Trust Model No Longer Applies Long gone are the days when every device was owned, controlled and secured by IT. Trends like Bring Your Own Device (BYOD) and Bring Your Own Software (BYOS) blur the lines between what IT controls and what it doesn t. While BYOD and BYOS may be good for productivity, they re bad for security. Sixty-one percent of security breaches today are carried out by insiders: an employee, a contractor or a business partner on site. * Legacy Static Security Frameworks Cannot Adapt Today s networks are anything but static. With near-universal mobility of users, devices and apps, fixed, immutable choke points are things of the past. The dynamically expandable cloud makes perimeter boundaries even more fluid. * Dtex Systems: Insider Threat Intelligence Report. January 2017. 4

REASON 2: The Costs from Intrusions Are Unacceptably High Complex, nuanced attacks infiltrate and lurk within hidden areas of today s networks, often taking weeks to detect and even longer to contain. Meanwhile, the attacker can wreak havoc on an organization s business by continuing to exfiltrate data. The costs can be severe and expensive: Businesses may be forced to comply with breach notification and reporting mandates, face litigation and pay hefty fines. It can also have a negative impact on trust. Ultimately, leery customers might be inclined to take their business elsewhere. 16 65 The median number of days from intrusion to detection for internally detected breaches. * The median number of days from intrusion to detection for breaches detected and reported by external parties. * * Trustwave Holdings, Inc. 2017 Trustwave Global Security Report. 2017. https://www2.trustwave.com/cpn-2017-06-gsr_gsr-success-page.html?aliid=1884558783 5

REASON 3: Security Pros Face a Perfect Storm of Challenges Evolving threats and increasing attack surface Surging volumes of data to be analyzed It s tough to be in security operations (SecOps) these days. High-profile attacks are headline news, and the sheer volume of alerts can make it challenging to prioritize what needs attention first. SecOps face an expanding portfolio of responsibilities spread across myriad functions, technologies and processes. Network security today depends on strong communication and collaboration between SecOps and network operations (NetOps) staff * two teams that have historically operated as separate entities and often, at odds. Skilled resources are typically stretched thin across both groups, with too few people covering too many responsibilities and they need a better way to work together. Simplifying key security operations processes and adopting the right security technology architecture are essential to driving the convergence of these teams and ultimately, to improving overall network security and performance. High cost of security tool sprawl Difficulty accessing data across physical, virtual and cloud environments Speed mismatch of security tools and network Slow rollout and expansion of security initiatives Complex security stack to manage by limited staff Rollout of security tools impacting network uptime Use of encryption to hide threats * Ganguli, Sanjit and Orans, Lawrence. Align NetOps and SecOps Tool Objectives With Shared Use Cases, Gartner Research, September 2017. https://www.gigamon.com/resources/resource-library/analyst-industry-reports/ar-gartner-align-netops-secops-tool-objectives.html 6

ADDING MORE TOOLS TO KEEP OUT THE BAD GUYS IS EXPENSIVE AND IT WON T WORK 7

REASON 4: Ad-Hoc Security Deployments Have Long-Term Consequences Rising costs. Management and capital expenditure (CapEx) costs are soaring due to the proliferation of security tools across the network. Inconsistent view of traffic. Security appliances tied in at specific network points are often blind to traffic from other parts of the infrastructure. Added complexity. SecOps teams are unable to orchestrate or load balance data across security tools. Lost time. Time-constrained staff must manage tools individually and coordinate with NetOps to upgrade or make changes to security tools. Contention for traffic. Too many tools are trying to access traffic from the same network points while the full volume of traffic at those points oversubscribes the tool. Blindness to encrypted traffic. Many security appliances can t see encrypted traffic, and malware increasingly uses encryption to hide. Too many false positives. More security appliances create an excess of false positives for SecOps staff to wade through. 8

REASON 5: Exploits Have Changed. Defenses Haven t. It s been said that insanity can be defined as doing the same thing over and over again and expecting different results. Unchanged security models simply cannot handle completely new breeds of hackers and new types of threats. Commercialized hacking tools, malware-as-a-service and sophisticated multidimensional attacks are all becoming commonplace. At the same time, there is more data speeding across networks, an increasing burden on already overloaded security tools and a shortage of skilled security professionals. The whack-a-mole approach of adding new tools to address each of these problems creates a patchwork quilt that cannot cover every scenario and only increases cost and complexity. Unchanged security models Surging volumes of traffic SecOps and NetOps at odds Blind spots 9

FASTER NETWORKS AND MORE SOPHISTICATED THREATS DEMAND AN ELEMENTAL CHANGE IN SECURITY 10

Build a More Secure Business So, what s the best approach to improving your overall network security posture? Answer: You need more than a collection of single-featured security tools. Instead, you need an intelligent and integrated approach, starting with a security delivery platform that can help simplify and boost the efficiency of security operations, speed the detection of threats and optimize existing investments in security tools. The GigaSECURE Security Delivery Platform from Gigamon lets you access the data you need across your entire infrastructure in on-premises, virtual and cloud environments. As a next-generation packet broker purpose-built for security, it orchestrates the movement of data to security tools in ways you may not have known are possible. Simplify Operations Uncover Threats Faster Control Costs Deploy and manage analytics inline and out of band. Upgrade and make changes to security tools without impacting network availability. Align NetOps and SecOps. Evaluate and roll out new technology easily. Access data across the network in on-premises, virtual and cloud environments. Scale security at the speed of your network, even at 100Gb. Deliver relevant data to the right security tools for faster detection. Eliminate blind spots where threats may be hiding. Stop tool sprawl with fewer tools for lower CapEx. Maximize tool efficiency. Decrease SecOps load. Load balance data across tools to leverage existing investments. Reduce operational expenditures related to maintenance downtime. 11

UNTIL NOW, SECURITY HAS NEVER HAD AN ELEMENT THIS POWERFUL 12

Transform Security with the GigaSECURE Security Delivery Platform The GigaSECURE Security Delivery Platform is a vital element that bonds with your entire network ecosystem to make it more resilient, agile and secure. It connects to your physical, virtual and cloud networks, supporting both inline and out-of-band tools across multiple network segments simultaneously. Web Application Firewall Advanced Threat Prevention Centralized Tools Intrusion Prevention System Security Information and Event Management Data Loss Prevention Forensics Security tools link directly into the GigaSECURE Security Delivery Platform, eliminating the need to wait for maintenance windows or coordinating with NetOps for deployment. Tools receive a high-fidelity stream of relevant traffic from across your network infrastructure at a speed they can manage. GigaSECURE Security Delivery Platform Powered by GigaSMART APIs With security-specific capabilities, like load balancing, inline bypass, metadata and secure sockets layer (SSL) decryption, the GigaSECURE Security Delivery Platform helps you scale security with network upgrades while avoiding tool oversubscription, stopping tool sprawl and improving efficiency. Physical, Virtual and Cloud Metadata Engine Application Session Fltering Data SSL Decryption Inline Bypass Private Cloud Public Cloud On-prem Data Center Remote Sites Cisco ACI 13

The Defender Lifecycle Model: Make Security a Machine-to-Machine Fight Many organizations have implemented the GigaSECURE Security Delivery Platform to successfully feed critical data to different types of security tools whether prevention, detection or the emerging space of prediction. However, there s a much broader aspect to what a security delivery platform can enable. Prevention Basic Hygiene: Firewall, Endpoint, Segmentation, etc. Defender Lifecycle Model Detection Building Context: Big Data and Machine Learning Prediction Triangulating Intent: Artificial Intelligence and Cognitive Solutions Containment Taking Action: Firewalls, IPS, Endpoints, Routers The very nature of polymorphic threats means that you can no longer afford to build security silos where one security device does not interact with another, and excessive human intervention can no longer be required. Automated Automated The opportunity to create the security architecture built for the future has arrived. It s about an entire Defender Lifecycle Model, which encompasses four stacks: prevention, detection, prediction and containment. Across every tool in every one of those stacks, the imperative is to level the playing field with automation. Inline Bypass SSL Decryption Metadata Engine Application Session Filtering SSL Decryption Metadata Engine Application Session Filtering SSL Decryption GigaSECURE Security Delivery Platform Physical Virtual Cloud Inline Enforcement The Defender Lifecycle Model shifts control and advantage away from the attacker and back to you, the defender, by making security a machine-to-machine fight, not a person-to-machine fight. This is how your security architecture gets transformative. 14

The Power of the Gigamon Ecosystem No platform stands alone, and the GigaSECURE Security Delivery Platform is no exception. Together, Gigamon and its ecosystem partners address all of your data access and security requirements so you can focus on what matters to your business. 15

There s a New Element Ready to Help You Build a More Secure Business Visit: www.gigamon.com or contact us at 408.831.4000 #TheEssentialElement 2018 Gigamon. All rights reserved. Gigamon and the Gigamon logo are trademarks of Gigamon in the Untied States and/or other countries. Gigamon trademarks can be found at www.gigamon.com/legal-trademarks. All other trademarks are the trademarks of their respective owners. Gigamon reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 1056-03 06/18