Amazon Web Services - EXECUTIVE BRIEF: THE ... › sonic...EXECUTIVE BRIEF: THE BUSINESS NEED FOR...

3
EXECUTIVE BRIEF: THE BUSINESS NEED FOR COMPREHENSIVE NETWORK SECURITY ANALYTICS Emerging threats and new technologies demand greater insight and analysis Abstract Disastrous aacks can happen quickly in today’s highly disrupve and unpredictable cyber threat landscape. To keep the organizaon running and users’ producvity at an opmal level, network security personnel need to constantly monitor and maintain the health and defense of networks and services. The state of today’s cyber crime It is not uncommon for any organizaon’s network to be the vicm of security breaches. These might include unauthorized intrusions, insider threats and any number of malware or phishing aacks that could spread ransomware within the organizaon. These aacks slow an enre organizaon’s momentum, as key personnel divert their focus from key business priories to damage control. Network security stakeholders should be concerned with the rising risks created by the speed at which cyber criminals develop new types of threats using new aack vectors. Up to 84 percent of cyber aacks target the applicaon layer 1 , while 37 percent of cyber threats target emerging aack surface areas such as databases, IoT devices and appliances and micro services. 1 Emerging cyber aacks make organizaons the vicms of mobility, wireless, cloud and even IoT, rather than the beneficiaries of these new technologies. Aacks and malware can be hidden inside encrypted traffic to bypass firewall inspecon. Aackers can gain access to mulple parts of the network. Ransomware can enter via malversing, webmail phishing aacks or exploits. The inability to address rapidly emerging threats can hamper an organizaon’s ability to protect sensive informaon, meet compliance and maintain normal service operaons.

Transcript of Amazon Web Services - EXECUTIVE BRIEF: THE ... › sonic...EXECUTIVE BRIEF: THE BUSINESS NEED FOR...

Page 1: Amazon Web Services - EXECUTIVE BRIEF: THE ... › sonic...EXECUTIVE BRIEF: THE BUSINESS NEED FOR COMPREHENSIVE NETWORK SECURITY ANALYTICS Emerging threats and new technologies demand

EXECUTIVE BRIEF: THE BUSINESS NEED FOR COMPREHENSIVE NETWORK SECURITY ANALYTICSEmerging threats and new technologies demand greater insight and analysis

AbstractDisastrous attacks can happen quickly in today’s highly disruptive and unpredictable cyber threat landscape. To keep the organization running and users’ productivity at an optimal level, network security personnel need to constantly monitor and maintain the health and defense of networks and services.

The state of today’s cyber crime

It is not uncommon for any organization’s network to be the victim of security breaches. These might include unauthorized intrusions, insider threats and any number of malware or phishing attacks that could spread ransomware within the organization. These attacks slow an entire organization’s momentum, as key personnel divert their focus from key business priorities to damage control.

Network security stakeholders should be concerned with the rising risks created by the speed at which cyber criminals develop new types of threats using new attack vectors. Up to 84 percent of cyber attacks target the application layer1, while 37 percent of cyber threats target emerging attack surface areas such as databases, IoT devices and appliances and micro services.1 Emerging cyber attacks make organizations the victims of mobility, wireless, cloud and even IoT, rather than the beneficiaries of these new technologies. Attacks and malware can be hidden inside encrypted traffic to bypass firewall inspection. Attackers can gain access to multiple parts of the network. Ransomware can enter via malvertising, webmail phishing attacks or exploits. The inability to address rapidly emerging threats can hamper an organization’s ability to protect sensitive information, meet compliance and maintain normal service operations.

Page 2: Amazon Web Services - EXECUTIVE BRIEF: THE ... › sonic...EXECUTIVE BRIEF: THE BUSINESS NEED FOR COMPREHENSIVE NETWORK SECURITY ANALYTICS Emerging threats and new technologies demand

2

A dire need for insight and analysis

Ultimately, the network security team may have only very limited visibility and insight into everything that goes on in the organization’s network security environment. This includes north-south and east-west network traffic, user access, connectivity, web and application usage, state of security assets, security events, threat profile and other security related data.

The lack of aggregation, normalization, correlation, and contextualization of disparate security data can lead to an incomplete and disjointed view of what is truly happening on the networks. The absence of this structured data leaves the organization at risk and further impairs the network security team’s ability to recognize and solve security problems. The organization needs to know all the risks and how to plan for them. As many as 94 percent of data breaches are preventable by practicing proper cyber hygiene and proactive risk management.1

Without the insight provided by analytics, the network security team finds it nearly impossible to do accurate security planning, make informed policy decisions, and respond to security incidents at the

speed required to meet organizational initiatives. According to Forrester, 74 percent of global enterprise security decision-makers rate improving security monitoring as a high or critical priority.2 Without complete awareness and understanding of the network security environment, it is very difficult to keep the security risk down to a minimum, ensure network uptime, service delivery and workforce productivity, and conforms to compliance regulations. These are key challenges security operations face today.

ConclusionAs the pace of cyberattacks accelerates, network security stakeholders need to be concerned about their capacity to stay apprised of their threat posture, protect sensitive information, meet compliance and maintain normal service operations for all business locations and users, while safely moving the company’s digital transformation forward.

Learn more. Read our Solution brief A comprehensive approach to network security analysis.

Critical Network Insight

• North-South Traffic• East-West Traffic• User Access• Connectivity• Web Usage• Application Usage• State of Security

Assets• Real-Time Security

Events• Threat Profiles• Relevant Security-

Related Data

1 “The New Enterprise Security Model: How to Operationalize Cyber Risk Management in Today’s Dynamic Threat Landscape,”RiskSense2 The Forrester Wave™: Security Analytics Platforms, Q1 2017

Page 3: Amazon Web Services - EXECUTIVE BRIEF: THE ... › sonic...EXECUTIVE BRIEF: THE BUSINESS NEED FOR COMPREHENSIVE NETWORK SECURITY ANALYTICS Emerging threats and new technologies demand

3

© 2018 SonicWall Inc. ALL RIGHTS RESERVED.

SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners.

The information in this document is provided in connection with SonicWall Inc. and/or its affiliates’ products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of SonicWall products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING,

BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. SonicWall Inc. and/or its affiliates do not make any commitment to update the information contained in this document.

About Us

SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of the more than 500,000 businesses in over 150 countries, so you can do more business with less fear.

If you have any questions regarding your potential use of this material, contact:

SonicWall Inc. 1033 McCarthy Boulevard Milpitas, CA 95035 Refer to our website for additional information. www.sonicwall.com

ExecBrief-TheBusinessNeed-US-VG-MKTG764