Вы находитесь на странице: 1из 3

SPONSORED REPORT

IMPROVE CYBERSECURITY WITH NETWORK VISIBILITY

GameChanger NETWORK VISIBILITY FOR COMPLEX NETWORKS

New Challenges Raise Stakes


for Network Visibility
A holistic approach is better suited toward todays complex networks.

G overnment networks looked


drastically different ten years
ago than they do today. Ten years ago,
virtualization was just taking hold. Other
advances, like cloud infrastructure,
pervasive mobility, the use of sensors
and digital government, were just getting
started. These changes have created
more network traffic, more complexity,
and more blind spots.
All these advances mean multiple
network connections. To remain
productive and secure, agencies need
consistent and thorough visibility into
all these connections. Yet today, many
organizations dont have the visibility NETWORK VISIBILITY: THE it increasingly difficult to identify and
they need. A 2016 survey from SANS, CORNERSTONE OF EFFECTIVE prevent malicious activities.
for example, found only 16 percent CYBERSECURITY According to ESGs Network Security
of respondents consider their network Cybersecurity remains a top priority for Monitoring Trends Report, about one-
visibility infrastructure mature.1 government agencies. In 2016 alone, the third of organizations report blind spots
There are several ways to increase White House announced its intentions to are one of the top challenges related to
network visibility. At the very implement the Cybersecurity National network security monitoring. Limited
least, revisit existing policies and Action Plan. Among other things, this visibility makes it harder to monitor
tools with an eye toward plugging would create the position of Federal network flow to detect breaches or
the gaps, says Dan Conde, analyst Chief Information Security Officer. The attempted breaches, both on traditional
at Enterprise Strategy Group. He White House also has allocated more and WiFi networks.
recommends a more holistic, platform than $19 billion for cybersecurity in the To ensure full visibility, experts
approach. Most organizations have FY 2017 budgetthats more than a 35 recommend tools that can:
dozens of point solutions for network percent increase from FY 2016. n Monitor both north-south and east-
management and monitoring, but are Part of that funding is allocated for west traffic
missing important tools to improve agencies to retire and replace legacy IT n Continuously monitor, analyze,
network visibility. By separately systems with more modern, effective categorize, separate and store all
managing each tool, its easy for technology. Thats a golden opportunity relevant activity
connections to fall through the gaps. to switch from traditional endpoint n Use multiple data sources to
Instead, base your network visibility cybersecurity tools to new solutions that provide a full view of security incidents
capabilities on a strong platform such address todays complex networks. over time as they evolve and move
as NetFlow or SFlow. A strong platform While legacy cybersecurity tools through networks
will help external solutions such as still have value, they often dont n See the type, operating system,
intrusion detection systems and firewalls provide the comprehensive visibility compliance status, connection method
plug in via APIs. These platforms required for tight security control. The and geographic location for every
usually have easy-to-use, configurable rise of virtualization, cloud storage connected device
Shutterstock.com

management consoles and ensure all and services, and other 21st century n Use intelligent packet capture
tools work together to provide the technologies have created blind spots n Set policy and behavior thresholds
requisite visibility. that prevent full visibility. This makes n Employ security analytics
1
https://www.sans.org/reading-room/whitepapers/incident/incident-response-capabilities-2016-2016-incident-response-survey-37047
SPONSORED REPORT

IMPROVE CYBERSECURITY WITH NETWORK VISIBILITY

GameChanger NETWORK VISIBILITY FOR COMPLEX NETWORKS

The Challenge of Insider Threats


Some of the greatest network threats come from within an agency.

T he idea of government employees


or contractors accessing sensitive
data or deliberately halting network
is allowed to be on the network, what
devices are allowed on the network, and
specific role-based access for users and
operations may seem unbelievable. groups of users.
But it happensand it happens The IT department has to be able
quite frequently. A 2015 report from to notice if someone is trying to get
Meritalk2 found 45 percent of agencies into an area of the network they arent
experienced insider threats and almost authorized to get into, or that packets
30 percent lost data as a result of those coming from a certain destination are
incidents. Of course, not all those trying to infiltrate a specific IT device
incidents are deliberate. Some happen like a server or another switch, or
simply because users fail to follow that somebody has brought in a rogue
approved policies, leading to breaches program and is trying to introduce it
like using unsecured connections and is critical, yet the Meritalk study found onto the network, says Duffy.
clicking on malicious links. nearly half of agencies cant tell how or Network monitoring toolsespecially
Recent years have seen an explosion if a document has been inappropriately those providing lateral (east-west) visibility
of technologies like cloud, mobility and shared and about one-third cant tell and behavioral anomaly detectionare
sensors, along with the push toward what data has been lost. critical to protecting the network within
digital government and virtualization. The key, says Jim Duffy, senior the perimeter. For insider threat detection

Shutterstock.com
These advances make these threats and networking analyst at 451 Research, and prevention, these capabilities are as
potential breaches even more difficult is to develop and enforce policies to important as others required for network
to pinpoint. Internal network visibility determine who is on the network, who visibility outside the perimeter.

ADVANCES IN NETWORK VISIBILITY TECHNOLOGIES


CHANGING PRIORITIES AND TECHNOLOGIES have in instrumentation now help you monitor virtual
made full network visibility more difficult than ever before. environments much like physical environments. This is
Here are four areas in which the tools and processes have especially useful for workloads in the cloudsomething
advanced significantly. that has been virtually impossible until recently.
Improved Packet Capture, Store and Analysis: More Robust Packet Brokers: Todays network
Imagine your network was breached 20 minutes ago. packet brokersbasically watchdogs that distribute the
Wouldnt it be useful if you could go back in time 20 right data to the right toolsare evolving to address
minutes to examine what happened, find the root cause, todays issues, such as virtualization, increases in network
fix the problem, and better prepare for the next event? speed, and the bi-directional information flow. Modern
Todays packet capture tools can do just that. Think of packet brokers can also eliminate redundant data while
these tools as a network visibility DVR. They can capture retaining original data packets; perform deep packet
and analyze network traffic, and provide valuable statistics inspection, SSL decryption and data masking.
and other information to help you drill down to find root Streaming Analytics: Like big data analytics, these
cause of events. solutions analyze large amounts of information from multiple
Better Network Instrumentation: The types of sourcesand they do so in real time. They can monitor
instrumentation organizations use to monitor network live network traffic as it flows. In some cases, they can also
state, performance, traffic, usage and devices on the replaceor at least augmentSNMP polling. With the ability
network varies dramatically. It typically includes some to monitor network traffic in real time, streaming analytics
combination of agents and probes. Recent advances can serve as the basis for real-time analysis and action.

2
https://www.meritalk.com/insidejob
SPONSORED CONTENT

IMPROVE CYBERSECURITY WITH NETWORK VISIBILITY

GameChanger NETWORK VISIBILITY FOR COMPLEX NETWORKS

Manage Advanced Threats in a


World of Pervasive Encryption
Techniques such as pervasive encryption provide additional network monitoring challenges.

P ervasive encryption is the concept of


encrypting as much network traffic
as possible. This is widely considered
technologies less relevant in terms of
traditional threat identification.
These capabilities when combined
can result in valuable network security
information for the analyst. And when
the Gold Standard of security in 2017. NEW WAYS TO EXAMINE combined, this can translate into a
Thats particularly true in the federal TRAFFIC security-relevant threat overlay for
government arena, which encrypts as What all this means is that agencies the entire Enterprise network. More
much as 90 percent of its network traffic. and other organizations need new ways importantly, it provides agencies with an
While this practice clearly improves to analyze network traffic to maintain immediate operational understanding of
security, there are real challenges to or increase their security posture. For their networkin other words, a very
real cyber-situational awareness.
The ability to fuse this information
TODAYS REALITY REALLY REQUIRES AGENCIES together is critical to cybersecurity
today, says Benhase. Without it, you
TO TAKE A SECOND LOOK AT WHETHER THEIR are in effect staring at a 12-inch black
VISIBILITY IS BEING IMPACTED. and white CRT in the 1950s instead of
watching a 65-inch 4K resolution screen
ANDREW BENHASE, PRINCIPAL ARCHITECT, CISCO SYSTEMS mounted on the wall.

going dark, as the practice of pervasive example, the behavior pattern within FIND THE RIGHT PARTNERS TO
encryption is often called. One of the the network is more important than ever ENSURE DEFENSE IN DEPTH
biggest issues is dealing with the loss of before. It can provide more detailed Improving cybersecurity these days
the network traffic visibility necessary to information about the flow of information clearly requires a new approach. That
fully protect agency data and networks. For within the network, even though the approach must combine traditional cyber
example, the FBI has repeatedly voiced information is actually encrypted. technologies like deep packet inspection
concerns about how law enforcement is With the right technology, IT staff and next-generation firewalls with newer
sometimes less effective because it cant can analyze the packet metadata, or the innovations to help gain dimensional
interpret fully encrypted traffic. information collected from the network depth against the challenges of an ever
Besides the lack of visibility, pervasive about what is happening within the increasing world of pervasive encryption.
encryption is causing more organizations network. For example, an agency can Bringing these security technologies
to remain unaware of persistent and use technologies such as NetFlow or together into a comprehensive Defense
embedded cyber-attacks over long IPFIX to collect data from every network in Depth strategy is best achieved by
periods of time. One thing often thing component and send it in as information partnering with experienced information
leads to another. An innocuous event about actual network traffic to be analyzed. security companiesespecially those
leads to someone discovering something The intelligence of some of todays with specific government expertise.
odd, which leads to another layer of most advanced solutions can also With the right partners, agencies can
security concern. By the time an Incident analyze the IP address attached to the ensure theyre using the most advanced,
Response team is involved, the situation header of each packet and increase effective, cohesive solution possible.
is completely out of hand. tie that into security data being stored
Todays reality really requires elsewhere. Correlating that IP address
agencies to take a second look at whether to a wealth of information within the
their visibility is being impacted, says network can yield critical data, such as
Andrew Benhase, Principal Architect usernames, employee names, physical
with Cisco Systems. Such a high locations of devices, time of login,
percentage of traffic encryption today machine type, posture of the machine http://www.cisco.com/c/en/us/products/
can render some network security and detailed directory information. security/stealthwatch/index.html

Вам также может понравиться