Story image

The IoT arena is exploding: Why network visibility is key to keeping cyber threats at bay

28 May 2018

By 2020, there will be more than 20 million unmanaged devices on networks, largely due to Internet of Things devices, of which only 10% can be managed by traditional security products.

The explosion of devices is creating a new wave of risks for businesses, who are facing cyber attacks as well as the cost and reputation damage that go with them.

According to ForeScout, businesses must improve their visibility into what’s happening on their network so they can respond to threats faster.

“Businesses need real-time visibility, thorough vulnerability assessments, and automated mitigation to keep up with the volume and severity of security risks,” comments ForeScout chief marketing officer Steve Redman.

“Network and endpoint security has become too complex for individuals to manage. Businesses must automate. This requires businesses to choose best-of-breed security solutions that are easy to integrate through standardised APIs.” 

Businesses must gain visibility into every device that can have an IP address assigned to it. They must also look for a security platform that offers contextual data and assesses the information to set policies around how devices are managed in the network.

In a nutshell, businesses need to understand what type of device is accessing the network, who owns it, where and how it’s connecting, and what security measures that device has.

“Agentless solutions tend to work better than those that rely on agents because many endpoint devices can’t use agents. Furthermore, agents can be misconfigured or fail to be deployed on all devices, so there will always be visibility gaps. An automated approach that delivers full visibility into every single device is the only way to manage vulnerability,” Redman says.

Businesses should also look for a solution that lets them classify endpoints differently and then set appropriate policies for each.

“Security tools need to talk to each other and work together, eliminating silos. Doing so will help maximise existing investments in security. One security vendor can’t completely cover an organisation’s security needs from end-to-end. So, if taking a best-of-breed approach is inevitable, it’s essential to get the strongest performance from each solution as they work together to solve the problem. When that happens, the resulting solution is worth much more than the sum of its parts.” 

ForeScout says businesses should conduct an entire security portfolio review; check for tool interoperability, and understand what problems they can solve. This will encourage vendors to integrate and work together.

“Visibility and automation are key. Businesses need a solution that delivers full visibility into everything that’s happening on the network, assesses vulnerabilities in real time, conducts automated device scans, and undertakes risk mitigation and remediation with automated responses. Once that’s in place, businesses can allow devices into the network without fear that they’ll introduce security risks,” Redman concludes.

Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."