Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Network Security

Graduating to the Era of Digital Transformation

It’s that time of year when thousands of students graduate and begin the next phase in their life journey. But not before they listen to commencement speeches rife with inspirational quotes like this one attributed to William G. T. Shedd: “A ship is safe in harbor, but that’s not what ships are for.”

It’s that time of year when thousands of students graduate and begin the next phase in their life journey. But not before they listen to commencement speeches rife with inspirational quotes like this one attributed to William G. T. Shedd: “A ship is safe in harbor, but that’s not what ships are for.”

Leaving the comfort zone of a campus and a parental safety net to venture out on their own is scary, but that’s what these graduates must do to realize their full potential and their dreams. In the process they’ll need to evolve some of the methods that served them well in a more sheltered environment for success out in the real world.

Sound familiar? It should. This scenario is similar to what we’re all confronting as IT, business, and government leaders with respect to venturing forth in the Digital Economy.

For years we operated in the relatively safe confines of the traditional walls of the enterprise. But that’s not where the opportunity to create significant value lies today; it’s in the new world of ever-expanding connectivity and digitization. And as we engage in this Digital Economy and confront the new dynamics it brings, including well-funded and highly motivated attackers, we need to evolve our approach to IT security to better protect our enterprises and communities and unlock the great opportunity that digitization presents.

Network SecurityModern extended networks allow businesses of all sizes and governments to change the way they interact with and deliver value to customers, partners, and citizens. Digitization, the transformation of objects like movies, books, healthcare records, and money into bits and bytes, is creating additional ways we can use our extended networks to interact with communities of users. New digital business models are helping us to deliver better products and services tailored to what buyers want, when and where they need them, as well as to create new products and services that we never even imagined. Think about how wearable health and performance monitors, smart cars, smart grids, connected oil rigs, and connected manufacturing have begun to revolutionize the way we work, live, play, and learn.

But connectivity of more devices, relaying more and higher value data, has created even more opportunities for hackers to profit from successful attacks. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. Compensated to break in to specific organizations and complete a specific mission, they are persistent in their efforts and launch multi-faceted attacks using multiple attack vectors.

While our defenses have also evolved, organizations are mired in complexity and fragmentation with too many disparate security technologies that can’t – and don’t – interoperate. Many security teams are stretched so thin that don’t have the resources to cover the security basics like patching, configuration management, or identity and access provisioning. But what if we could turn the number of security technologies we have installed into an advantage? What if we could get these technologies to share information?

Most organizations have deployed security technologies across some combination of networks, endpoints, web and email gateways, virtual systems, mobile devices, and the cloud. If these technologies could externalize and export their data, we could access what these disparate technologies are seeing in a single visibility platform. Then we would know what devices, operating systems, and applications are running on the network; how they are configured; who is using the devices and systems; what they are doing; and how data is moving across the environment.

Advertisement. Scroll to continue reading.

With visibility across all extended network activity as the foundation, we can add context based on local and global threat intelligence, and apply controls using analysis and automation for a systemic response to detected threats. We can complement this platform with security solutions to address deficiencies and enable customers who don’t have security expertise in-house to gain the protection they need, everywhere. With an integrated threat defense architecture based on an intelligent network that includes a vast ecosystem of solutions, organizations would be better equipped to handle attacks today and in future.

Just as the graduating class of 2015 will evolve how they operate to realize their full potential in the real world, we must evolve our approach to security in the Digital Economy. By embedding security everywhere along the extended network at all control points and then sharing that information, we can see once and control and protect everywhere. When security becomes as pervasive as networks and devices themselves, it becomes a growth engine, freeing businesses and governments to embrace new business models and digitization with confidence.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies, including Valtix.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...