Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Combatting Today’s Attacks: It’s a Generational Thing

We’re facing a generation gap when it comes to combatting today’s attacks. Adversaries are using next-generation attack methods while many organizations are using first-generation defenses. And the situation is likely to get worse before it gets better. Designed for another time, most first-generation network security devices can’t keep pace with challenges like:

We’re facing a generation gap when it comes to combatting today’s attacks. Adversaries are using next-generation attack methods while many organizations are using first-generation defenses. And the situation is likely to get worse before it gets better. Designed for another time, most first-generation network security devices can’t keep pace with challenges like:

Technology disruption – Mobile devices, software as a service, virtualization and cloud computing are necessities as organizations look to ways to enhance productivity, save costs and speed deployment. Most security tools deployed today don’t provide adequate visibility to factor in dynamic network topology, behavior and traffic into security policy definition and enforcement decisions.

Network SecurityAdvanced attacks – The tactics that adversaries now employ, such as port hopping, encapsulation, zero-day attacks, command and control (C&C) evasion, lateral movement, encrypted traffic and sandbox evasion, make it very difficult to detect and block attacks. First-generation security tools lack the historical data and intelligence to handle attacks that use these methods.

Performance demands – In the age of multi-gigabit network connections at the perimeter and within the core data center, security devices need to inspect and enforce policies at these same speeds across all network subsections. This simply isn’t possible with traditional network security device architectures.

So how do you deal with this generation gap? New security approaches are emerging to address today’s fluid IT environment, sophisticated threats and increasing network speeds. Given that many first-generation devices have been deployed for over a decade and simply can’t adapt to this new reality, the time is right to revisit your security strategy and bridge the gap with a new approach to security.

As you talk to vendors about their latest network security technologies, below are key criteria to look for along with specific questions to ask to help you make more informed decisions and, ultimately, better defend your modern IT environment against modern attacks.

Visibility – You need to be able to accurately identify the applications active in your environment (regardless of protocol) and see the myriad of connecting hosts, infrastructure and users. With this visibility you can apply the context of network and user behavior to determine the intent of any given connection and whether it should be blocked. Key questions to ask your vendor include:

• How do you track and monitor for changes in my IT environment?

• Do you provide site reputation intelligence?

Advertisement. Scroll to continue reading.

• Can you monitor network activity based on user, device and application?

Threat effectiveness – You need to ensure your network security technology can protect against both known and emerging threats while maintaining effectiveness under load during peak utilization.

Questions to ask to make sure you’re covered include:

• What means do you use to detect threats?

• Can you detect and block based on content such as certain file types?

• Can you compare baseline network behavior against actual to identify anomalous activity?

Granular controls – You want your network security devices to enable safe access, not encourage employees to go around your defenses. This requires fine-grained security policies with the ability to customize detection and response for both applications and web sites. A few questions to ask your vendor include:

• How do you address policies across various security elements and how do you handle policy exceptions?

• How flexibly do you handle access control options and application functionality?

• Do you support custom rule development?

Firewalls

Automation – For most IT security organizations, resources aren’t increasing to keep pace with advanced adversaries. You need tools to automate the provisioning and tuning of security policies and apply those policies consistently across the enterprise. A few key questions to ask your vendor include:

• How can you help me sift through thousands of security events each day and focus on what matters most?

• How can you minimize the time I now put into optimizing and tuning policies across the environment?

• Can you help me rapidly zero-in on users tied to events and respond to anomalous behavior?

Advanced malware protection – With increasingly sophisticated malware attacks, it’s becoming more difficult to reliably detect malware on the network and remediate it if it does successfully get through. Cloud-based malware intelligence and the ability to coordinate defenses across the environment are now essential. Key questions to ask your vendor include:

• How do you gather intelligence on emerging threats?

• How does your malware analysis automatically update detection capabilities across all control points?

• How do you perform continuous analysis and retrospective security in the event of malware that is dormant during entry and later exhibits malicious behavior?

Performance, scalability and flexibility – To analyze and apply complex policies at high speeds, performance and the ability to scale to multi-gigabit networks is critical. Flexibility to support your deployment model today and the capability to easily change in the future gives you investment protection. Ask your vendor:

• Do you have 3rd-party validated performance results you can share?

• What security capabilities can I deploy on the same device?

• What type of availability, connection speeds and connectivity options do you offer?

Management and extensibility – To be practical, any updated approach to network security must enable centralized IT security management across the entire enterprise and seamlessly support additional capabilities. Key questions to ask your vendor include:

• Can I manage multiple policies across enforcement points?

• What reporting capabilities do you offer to support security, incident response and compliance?

• How do you integrate with complementary 3rd-party solutions?

It’s only a matter of time before your organization faces a breach. The good news is that network security technologies are evolving so you no longer have to be hampered by first-generation approaches. Armed with the right questions you can be confident that you’re making the best decisions to protect your organization and mitigate risk in this challenging era.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...