Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

The Network is the Security Device

More than thirty years ago, John Gage of Sun Microsystems coined the now famous phrase: “The network is the computer.” Indeed the true power of the computer comes from being connected, and with more devices connected the power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE) which is creating unprecedented opportunities for networked connections among people, processes, data, and things.

More than thirty years ago, John Gage of Sun Microsystems coined the now famous phrase: “The network is the computer.” Indeed the true power of the computer comes from being connected, and with more devices connected the power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE) which is creating unprecedented opportunities for networked connections among people, processes, data, and things.

Largely because of this exciting evolution, we are now facing a similar inflection point with respect to security. To capture opportunities made possible by ever-expanding connectivity, security must evolve in lock-step. In effect: “The network must become the security device.” Let me explain.

Network SecurityThe widespread adoption of the cloud and the IoE brings new business opportunities in the form of greater speed, efficiency, and agility, while also changing the game on where data is stored, moved, and accessed. Further, mobility and the cloud have dramatically increased employee productivity and satisfaction but also replaced the traditional network perimeter with a constantly morphing set of users, locations, applications, access methods, and devices. This creates the dual challenge of defending a dynamic perimeter and creating a near infinite number of points of vulnerability. All of these considerations create greater opportunities for attackers.

So how have we evolved our approach to security as defenders? The truth is, not nearly enough. Caught in a cycle of layering on the latest security tool, it isn’t unusual to find organizations with 40 to 60+ different security solutions that don’t – and can’t – work together or interoperate. Attackers are taking advantage of gaps in visibility and protection that this complexity and fragmentation creates to penetrate the network. Environmentally aware, attackers navigate through the extended network, evading detection and moving laterally until reaching the target. Once they accomplish their mission they remove evidence but maintain a beachhead for future attacks.

To truly address today’s dynamic threat landscape, evolving business models, and considerable complexity, security must be embedded into the heart of the intelligent network infrastructure and across the extended network – from the data center out to the mobile endpoint and even onto the factory floor.

When the network is the security device, our approach to security can be:

Pervasive – to persist across all attack vectors

Integrated – to share information and capabilities with a rich ecosystem of applications and services

Continuous – to allow for ongoing protection across the full attack continuum – before, during, and after an attack

Advertisement. Scroll to continue reading.

Open – to integrate with third parties, including complementary security technologies and threat intelligence feeds

This requires that we build technologies into network infrastructure that increase visibility across all network activity, provide context based on local and global threat intelligence, and allow control using analysis and automation to dynamically protect against detected threats. We must design infrastructure that is open so that new capabilities and intelligence to address complex and evolving threats can be easily incorporated. And we must embed security without impeding business-critical resources and processes.

John Gage’s predictions couldn’t have been more on target. Roll forward three decades and there are parallels we can draw with respect to security. By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler. Only then can businesses take full and secure advantage of opportunities presented by new digital business models and the IoE.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.