itb-au logo
Story image

Trust without visibility is blind – Avi Networks

14 May 2019

Article by Avi Networks Australia and New Zealand regional VP George Tsoukas

Trust is a fickle concept in IT security.

Organisations trust their applications are secure until that trust is violated — like after a vulnerability is exposed or after an outage or breach.

In other words, trust is something IT professionals are acutely aware of, especially when they don’t have it.

Today, so many enterprises place blind trust in application security.

They trust cloud providers because the status page shows a green light, they trust that their policies are sufficient because the application is still available, and trust the network because packets are flowing.

But it’s what they don’t see that hurts them.

More importantly, enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves, making excuses for outages and pleading for forgiveness on social media platforms because they can’t get to the root cause.

No CIO, nor any executive, wants to be the focus of thousands of customer attacks on Twitter.

Security threats and vulnerabilities are usually discovered only after the damage is done.

IT teams then react to the security threat and spend days collecting and analysing information for a post-mortem.

Policies and procedures are adjusted, and they trust blindly that they have resolved the issue until that trust is violated again. Rinse and repeat.

Security functions only as users define it to work, not as they intend it to work.

This is why 25% of data breaches are tied to human error.

IT teams can take a more proactive approach to security by focusing on providing visibility into their applications, infrastructure, networks and end-users.

By capturing and analysing data in real-time, anomalies and threats can be detected and avoided before any damage is done.

While many traditional appliances in an enterprise stack sit at a strategic position on the network with access to critical data, they aren’t architected to leverage that data to improve visibility, troubleshooting and security.

Modern application services solutions, built on software-defined principles, have the flexibility to capture and process this data across your data centres and clouds.

While these next-generation solutions can enhance security with your existing applications, they are absolutely necessary for microservices and container-based applications.

With the rise of technologies like Kubernetes and Istio, the visibility and security paradigm is beginning to shift.

Microservice applications can be distributed across hundreds of containers, each requiring unique communication and security policies.

Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.

Businesses rely heavily on applications and IT.

And as the number of applications and the complexity of these applications increase, operations teams can no longer rely on reacting to security threats.

They need to stay a step ahead and fast-track their root-cause analysis to get to the source of the issue in their infrastructure.

Modernising enterprises need to secure and trust their applications and infrastructure, but they can’t achieve this using tools and services that don’t give them the visibility they need to drive their application strategies and, ultimately, their business.

Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Story image
VMware launches application consolidation platform for enterprise
VMware says its vSphere 7 delivers services for the modern hybrid cloud, powering the compute environments for modern applications, AI and machine learning, and business-critical applications.More
Story image
Trustworthy and reliable: why making data privacy a priority leads to stronger customer relationships
Showing you’re scrupulous about how you collect, use and store customer information also has a positive impact on your customers’ experience with your brand and your bottom line.More
Story image
IDC: 4Q19 picks up cloud infrastructure market
The 12.4% year-over-year growth in 4Q19 brought the full year into positive territory with annual growth of 2.1% and total spending of $66.8 billion.More
Story image
CompTIA launches COVID-19 resources forum for tech industry
IT and tech industry forum CompTIA has created an interactive online forum dedicated to serving technology firms and workers during the COVID-19 pandemic.More
Link image
Why employees have never been more vulnerable to cyber attack
COVID-19 is presenting the perfect opportunity to cyber attackers to mount potentially devastating spear-phishing campaigns against organisations via their remote workers. Learn how to fight back.More