Story image

How can you secure your enterprise network?

20 Apr 16

Your enterprise network, the data you hold and the application services you support are all directly in the cross-hairs of hackers, spies and opportunists of every stripe. And why not? Stolen data is a commodity worth money (or bitcoins!) on the open market. If your organisation has any sort of public profile, you are a target for cyber-criminals. The bigger your enterprise, the bigger the target.

You want to keep your private and sensitive commercial data safe and secure. And you want to be able to assure stakeholders that this is so. But can you really secure your data and application services from all threats, especially criminals who are prepared to make a major effort to break into your network?

“Is any network 100% safe?” asks Gary Gardiner, A/NZ Director of Engineering & Services at Fortinet, a global leader in the provision of cyber-security solutions. “Of course not. Even the White House, the Pentagon and the Kremlin get hacked. And they have massive security budgets and thousands of full-time black and white hat experts. But you can make it extremely difficult for all but the most well-funded and relentless crooks to even come close to getting inside your networks. How? By hardening your cyber defences inside and out.”

Advanced persistent threats
Today’s most damaging attacks, typically classified as Advanced Persistent Threats (APT), occur across the spectrum of possible attack vectors. Innovative malware, zero-day vulnerabilities and emerging evasion techniques can all render a single approach problematic.

“A deeper, more comprehensive approach is needed,” says Gardiner, “to counter these increasingly sophisticated attacks. Fortinet, and other security vendors, are all working hard to build a multi-layered defence-in-depth framework for combating these APTs.”

Prevent – The known threats
Most malware is already known. Last year, nearly a quarter of malware was more than ten years old and almost 90% discovered before 2014.  Known threats can be blocked through next-generation firewalls, secure email gateways, endpoint security and other technologies. Previously unknown malware and targeted attacks, however, can hide from these measures. Dodgy traffic that seems suspicious should be handed off to the next point of your multi-layered defence.

Detect – The unknown
Today’s more sensitive filters can detect previously unknown threats and create actionable threat intelligence. Sandboxing, for instance, isolates potentially malicious software in a sheltered environment so its full behaviour can be observed without affecting production networks.

“But sandboxing alone can’t stop everything,” continues Gardiner. “Attackers respond to new technologies by figuring out how they work and then finding ways around them. Indeed, smart crooks are already trying to compromise sandboxes. That’s why it’s important to stay updated. Just as criminals evolve, your network defences need to keep up as well.”

Mitigate – Taking action
Once an intrusion has been validated, users, devices and content have to be quarantined. “You need to have automated and manual systems in place to ensure the safety of network resources and data,” says Gardiner. “That’s to contain the damage. But you need to fight back as well. FortiSandbox, for instance, automatically forwards any new threats to the FortiGuard Labs for analysis, de-construction and remediation. This results in updates being fed back to the security devices and providing every layer with up-to-date protection.”

Integration is key
“It’s not one particular technology that’s driving Advanced Threat Protection (ATP),” says Gardiner. “It’s the integration and collaboration amongst all of them. ATP relies on multiple types of technologies, products and research, each with different roles and each working in concert with one another. For example, FortiSandbox can integrate into FortiGate Next Generation Firewalls, FortiMail for inspection of attachments and FortiWeb web application firewalls for web-facing services.”

“We can expect to see continued cybercriminal innovation with an even greater focus on datacentres,” concludes Gardiner. “Your best strategy is to deploy a multi-layered approach with established and emerging technologies which work together. No other approach can defend against today’s Advanced Persistent Threats. It’s a challenge, to be sure, but one that has to be met.”

For further information, please contact Fortinet:
​anzmarketing@fortinet.com

Cofense launches MSSP program to provide phishing defence for SMBs
SMBs are highly susceptible to phishing attacks, and often lack the resources necessary to stop advanced threats
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.