sb-au logo
Story image

How network visibility tools are changing the security game

04 Oct 2018

Article by Riverbed APJ solutions engineer VP Sean Kopelke

The modern security environment is the most dangerous because it’s more complex than it has ever been.

Digital transformation has enabled companies to achieve new competitive advantages using cloud, mobility and IoT, but because these enablers are being built on decade-old networks, this has also created new vulnerabilities.

Traditional networks simply weren’t designed to support these new technologies.

Beyond security, this also impacts organisations’ capacity to tap into the connectivity, scalability and performance potential of the latest and most promising technology investments.

Further complicating matters, these new devices and technologies are delivering massive volumes of data from the network’s edge, the area most vulnerable to attacks and intrusions.

Without visibility into the behaviours occurring within a network, it’s almost impossible to detect if what’s happening is out of the ordinary, and therefore if breach has taken place.

Companies can’t manage what they can’t measure.

The sense of urgency of getting on top of this issue took a big leap forward in 2018, spurred on by new regulation like the General Data Protection Regulation (GDPR) in the European Union, and the Mandatory Data Breach Notification Laws which came into effect locally in February.

Even prior to these new legal incentives, 2017 Enterprise Management Associates (EMA) study identified networking security as the number one priority in network and application performance management.

The good news is that investments in digital transformation initiatives today can address many of the vulnerabilities generated by this collision of old and new technologies.

A software-defined, cloud-centric platform allows administrators to focus policies directly at the network edge, where IoT applications reside.

By providing the visibility into every corner of the network and the flexibility to scale resources in minutes, instead of months, these cloud-based platforms offer the ability to responsively and proactively maintain optimal performance.

Taking full advantage of the arsenal of data collected can support rapid investigation and mitigation of security breaches.

By broadening visibility over their network, security managers can realise cost efficiencies, reduce risk and improve productivity – securing their reputation in the process.

Story image
Cyber-attackers target COVID-19 vaccine supply chain in sweeping phishing campaign
IBM’s Security X-Force, a task force created in the early days of the pandemic with an aim to combat cyber-attacks related to potential vaccines’ supply chains, released details on a coordinated effort to disrupt the COVID-19 ‘cold chain’.More
Story image
Singapore makes an example of remote working in APAC, but security concerns persist
Respondents are most concerned about WiFi networks (39%), cloud storage (38%), email (36%), new technologies like IoT and 5G (34%), and video conferencing platforms (31%).More
Story image
Organisations continue to get hit hard by cyber attacks
Trend Micro published survey findings revealing 23% of global organisations suffered seven or more attacks infiltrating their networks or systems over the past 12 months.More
Story image
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.More
Story image
Rate of ransomware attacks in Australia well above global average — report
Over two-thirds (67%) of Australian organisations have suffered a ransomware attack in the last 12 months — 10 percentage points above the global average of 57%.More
Story image
NetMotion announces SASE platform leveraging Microsoft Azure
The platform offers integrated transport and web proxies, distributed firewalls, network access control (NAC), zero trust network access (ZTNA) or software-defined perimeters (SDP), a VPN highly optimised for mobile access, and AI-driven policy and risk analysis.More