Connect with us

Hi, what are you looking for?


Network Security

For Next-Generation Security Solutions, It’s All About Context and Visibility

Visibility and Context-awareness are Critical to Staying Ahead of Threats

The term “Next-Generation” is frequently used in the industry to signal that a new technology has made a sufficient leap forward, delivering efficiencies or effectiveness previously considered impossible for a product.

Visibility and Context-awareness are Critical to Staying Ahead of Threats

The term “Next-Generation” is frequently used in the industry to signal that a new technology has made a sufficient leap forward, delivering efficiencies or effectiveness previously considered impossible for a product.

Network Visibility and Context-AwarenessFueling one of the latest rounds of next-generation solutions is a shift to context-aware computing. Fostering innovation across a broad spectrum of technologies, context-aware computing is the ability of devices or applications to detect and analyze events in a changing environment and to respond accordingly. When applied to smart phones, automobiles or even refrigerators, context-aware computing can enhance quality of life. It can also spur business success in the case of customer service applications, collaboration tools or smart e-commerce sites. Context-aware computing is all about creating a richer experience on-the-fly and therefore requires agility.

When it comes to IT security, context-awareness is critical to staying ahead of the bad guys. The rate of change in today’s IT environments—the number of devices, users, applications and systems that connect to our infrastructure every day—is unprecedented. In addition, attacks are coming at an increasing rate and with an increasing level of sophistication. First-generation security solutions are typically blind to changing conditions and new attacks. Because you can’t protect what you can’t see, these traditional security solutions fall short of providing needed protection.

Security solutions that are context aware can see and intelligently correlate extensive amounts of event data related to IT environments—applications, users, devices, operating systems, vulnerabilities, services, processes, network behaviors, files and threats. This correlation provides the context needed to automatically and flexibly tune and protect organizations from today’s advanced threats.

But it isn’t enough to see and correlate data. Essential to context-awareness is the ability to learn and quickly respond. Not only do traditional security models lack the context to understand the security implications of new events, but because they typically are static—designed for a time when IT environments were fairly stable—they lack the ability to adapt accordingly. Ill suited for the demands placed on them today, they fall further and further behind in their ability to combat advanced threats. The latest network security platforms must be agile in order to adapt to not only today’s threats, but tomorrow’s as well.

On several occasions Neil MacDonald of Gartner has written about the need for security to be context aware and adaptive. In his May 2010 paper “The Future of Information Security is Context Aware and Adaptive” he states that by 2015, 90 percent of enterprise security solutions deployed will be context aware. In a recent blog post he states: “Context-awareness in the form of application, identity, content and environmental awareness is the foundation for a Next-Generation IPS (NGIPS).”

An October 7, 2011, paper by Gartner called “Defining Next-Generation Network Intrusion Prevention” further outlines the requirements for NGIPS to include first-generation IPS functionality plus four additional requirements—application awareness and full stack visibility, context awareness, content awareness and an agile engine.

Advertisement. Scroll to continue reading.

Network security platforms are increasingly being defined by awareness, context and agility. From the endpoint to the network, as threats become smarter and faster and computing environments become more complex, organizations can no longer rely on first-generation solutions for adequate protection. When planning your shift to next-generation security solutions, make sure your vendors can demonstrate the ability to see and understand context and that they have the agility required to adapt defenses and successfully protect today’s rapidly changing IT environments.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies, including Valtix.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...