itb-au logo
Story image

The IoT arena is exploding: Why network visibility is key to keeping cyber threats at bay

28 May 2018

By 2020, there will be more than 20 million unmanaged devices on networks, largely due to Internet of Things devices, of which only 10% can be managed by traditional security products.

The explosion of devices is creating a new wave of risks for businesses, who are facing cyber attacks as well as the cost and reputation damage that go with them.

According to ForeScout, businesses must improve their visibility into what’s happening on their network so they can respond to threats faster.

“Businesses need real-time visibility, thorough vulnerability assessments, and automated mitigation to keep up with the volume and severity of security risks,” comments ForeScout chief marketing officer Steve Redman.

“Network and endpoint security has become too complex for individuals to manage. Businesses must automate. This requires businesses to choose best-of-breed security solutions that are easy to integrate through standardised APIs.” 

Businesses must gain visibility into every device that can have an IP address assigned to it. They must also look for a security platform that offers contextual data and assesses the information to set policies around how devices are managed in the network.

In a nutshell, businesses need to understand what type of device is accessing the network, who owns it, where and how it’s connecting, and what security measures that device has.

“Agentless solutions tend to work better than those that rely on agents because many endpoint devices can’t use agents. Furthermore, agents can be misconfigured or fail to be deployed on all devices, so there will always be visibility gaps. An automated approach that delivers full visibility into every single device is the only way to manage vulnerability,” Redman says.

Businesses should also look for a solution that lets them classify endpoints differently and then set appropriate policies for each.

“Security tools need to talk to each other and work together, eliminating silos. Doing so will help maximise existing investments in security. One security vendor can’t completely cover an organisation’s security needs from end-to-end. So, if taking a best-of-breed approach is inevitable, it’s essential to get the strongest performance from each solution as they work together to solve the problem. When that happens, the resulting solution is worth much more than the sum of its parts.” 

ForeScout says businesses should conduct an entire security portfolio review; check for tool interoperability, and understand what problems they can solve. This will encourage vendors to integrate and work together.

“Visibility and automation are key. Businesses need a solution that delivers full visibility into everything that’s happening on the network, assesses vulnerabilities in real time, conducts automated device scans, and undertakes risk mitigation and remediation with automated responses. Once that’s in place, businesses can allow devices into the network without fear that they’ll introduce security risks,” Redman concludes.

Story image
InterSystems helps Aus laboratories in the fight against COVID-19
"InterSystems is proud to be helping SydPath, Austech Medical Laboratories, Goulburn Valley Health Pathology and other clinical laboratories, and we will continue making additional resources available to customers dealing with the pandemic.”More
Story image
HPE announces new virtual desktop solutions in wake of COVID-19
“The response to COVID-19 has pressured our customers to rapidly implement secure and remote work options for their organisations.” More
Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Link image
COVID-19: The tools ensuring security for remote working
Cyber threats are multiplying during the pandemic, and remote workers are at a heightened risk of cyber attack. Here are the security solutions to defend against the wave of virus-related threats.More
Link image
RSA offers cutting edge authentication software free
Secure authentication has never been more important now that remote working is the norm. Leverage biometrics, push notification and multi-factor authentication for free now.More
Story image
How data warehouses have become the new data lakes for business
While data lakes are great when it comes to storage, they don’t perform well when it comes to analysis and reporting. The vast volumes and multiple formats mean that traditional data warehouse tools are unsuitable and another approach needs to be found.More