Connect with us

Hi, what are you looking for?


Security Architecture

Breaking Enterprise Silos and Improving Protection

When teams have a way to break down enterprise silos and see and understand what is happening, they can improve protection across their increasingly dispersed and diverse environment.

As networks become atomized, the need for specialization comes into play. Infrastructure is spread across legacy, on-premises, hybrid, multi-cloud, and edge environments. Organizations have security operations center (SOC), network, cloud operations, and in some cases operational technology (OT) teams all tasked with keeping the business up and running and secure. And each team consists of subject matter experts with specialized levels of knowledge and specific tools that they use.

When capabilities, nomenclature, constructs, and available data are unique to each type of environment, teams operate in silos. So, it’s incredibly difficult to get a big picture view of what is happening across the organization to improve protection, maintain compliance, and optimize performance.

Finding a common language

What’s needed are tools that empower each team to do their job, as well as enable collaboration between teams. And that gets increasingly hard to achieve as the network becomes diverse and dispersed. Different teams have their own tools which they know inside and out, but the crossover value with the other teams is limited.

The first step to breaking down barriers between teams is to find a language that these teams can speak and one tool they can all use without needing to know the uber details of the different environments in which each team operates and how they describe what is happening. Think of it as a common root language but with different dialects. Different teams can share information without having to translate back and forth, and have the capabilities they need to protect their specific environments.

Adding context for greater understanding

The next step is to be able to incorporate context using common key words we all understand. Functionally, the teams may use the tool very differently; SOC analysts may use the tool for threat hunting, and the network team may use it for network visualization and performance. However, one language enriched with organizational context can be the glue that brings both teams together.

Advertisement. Scroll to continue reading.

Applying context labels to the same, standardized data creates corporate knowledge that they can share. Suddenly, “this IP address talked to that IP address”, becomes “this IP phone talked to a specific container in the cloud” or “this laptop talked to this video surveillance system.” Teams can search for and pull up the information they need using the same tool and the same language. They don’t have to go through a lengthy and cumbersome process of figuring out what something means in their AWS cloud tools versus their Azure cloud tools versus their OT systems and their IT systems. The translation is done for them.

Getting to the same meaning faster

Now, everyone can visualize what they’ve got, what it is doing, and what’s happening to it across environments. They can get to the same meaning much faster and move quickly to do what’s required to protect the organization. For example:

  • If there’s a scanning attempt or a brute force attack, the different security teams have a consistent view of what is happening – from the data center across different clouds and to their OT environment. They can conduct their own investigations to answer different questions, share interrelated questions, and collaborate to detect and respond comprehensively.
  • The network operations team can use the tool to figure out what’s causing load on the network and resolve performance issues quickly.
  • The threat governance team can see if a device is talking to a country of significant concern or if there is social media traffic where it shouldn’t be – and block it.
  • The governance risk and compliance team can validate against regulatory controls in place for operational compliance.

From detecting threats to misconfigurations in new services, pathways, devices, and users — When teams have a way to break down enterprise silos and see and understand what is happening, they can improve protection across their increasingly dispersed and diverse environment.

Written By

Matt Wilson is the Vice President of Product Management at Netography. Over his 25+ year career, Matt has held senior technology leadership positions across numerous industries including Neustar, Verisign, and Prolexic Technologies. With a rich background in innovation and go-to-market strategies, Matt has been a critical leader in helping many companies conceptualize solutions from the customer lens and drive them to market with significant impact.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...


Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...