Network Security

Rethink your cybersecurity strategy

Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective – yet that's what is required for these approaches to succeed.

Security breaches are inevitable, and it's not the fault of the quality of your perimeter defense tools or your IT security staff. The problem is your fundamental approach.

Here are four reasons to rethink a perimeter-focused approach to cybersecurity:

The increasing connectedness of organizations extends the network perimeter while making it porous. Mobile and cloud computing push the range of enterprise applications and data far beyond the data center and provide new ways for malware to enter the network. Once inside, malware is invisible to perimeter defenses, exposing the enterprise's ‘digital crown jewels' to harm.

Advanced threats are winning against current security controls, and adding more controls doesn't help. The most dangerous threats are stealthy and persistent, often unfolding in stages over days, weeks, or even months. Attackers can remotely direct the initial compromise, causing it to spread laterally and shape-shift to achieve their end game.

Each prevention-centric product has only one imperfect chance to identify a particular threat before it slips past the defenses into the network. And once malware enters the network, perimeter defenses are blind to any further activities, leaving the attacker free to conduct its dirty work.

Prevention-focused security strategies drain IT resources. It can take an experienced security analyst weeks to properly tune a firewall or IPS, and hours or days to sift through thousands of daily alerts. There aren't enough highly skilled security analysts to meet demand.

Network security has always been complex, but that complexity is accelerating — as is the sophistication of the entire ecosystem of malware. What's needed are cybersecurity strategies that are even more adaptive than the malware they're trying to outmaneuver.

Oliver Tavakoli

Oliver Tavakoli is chief technology officer at Vectra AI. He sets the technical strategy for the company. Oliver has overseen the adoption of technology in cybersecurity for over 25 years, the last ten of which have been at Vectra AI. Prior to Vectra, Oliver was the CTO for the security business of Juniper Networks. He joined Juniper as a result of its acquisition of Funk Software, where Oliver was the CTO. Earlier in his career, Oliver worked at IBM, Fluent Machines, and Novell Inc and founded Trilogy Inc, which was acquired by Funk Software.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.