Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.
tannerigor

The Future Of Network Security

2014: The year network security operations become orchestrated

Sign in Network World - Enterprise connectivity is exploding, driven by globalization, convergence , virtualization and social computing. As corporate perimeters dissolve, the security focus switches towards application and data-level security solutions. The question to ask is what are the longer-term implications for network security? Will it become redundant or could it grow more powerful?
For the original version including any supplementary images or video, visit http://www.networkworld.com/columnists/2008/013008-jericho-network-security.html

BeyondTrust Releases Network Security Scanner With Unlimited Vulnerability Assessment And Compliance Reporting

IT Pros Guide to Data Protection: Top 5 Tips to Securing Data in the Modern Organization As such, firewalls have become the natural focal point for network layer orchestration. Orchestration significantly automates painful manual security policy change processes while preserving governance and control over the process, which is absolutely crucial for security-related changes. In addition, orchestration provides the capacity to automatically provision changes to relevant devices and systems such as applications and servers that require current and accurate security policies. Additionally, if you look at the broad orchestration-related announcements made in 2013, it's safe to assume that my prediction will play out, as these platforms become embraced and validated in production environments in 2014. This will create a healthy balance between business units, some of which may have already been automated. So when I predict that orchestration will drive the business forward, that is not lip service. In fact, the benefits have already been identified and are clearly quantifiable . This segues into my second prediction: that in 2014, security ops will converge with IT ops to the point where they no longer exist as separate entities. This convergence is already underway. A recent survey of 502 IT executives revealed that 71 percent had to adopt new processes, learn new technologies and interact with new people because of trends like Cloud, IPv6, DevOps and virtualization. Fifty-five percent reported that new business initiatives now require security's input, and almost one third reported that they require data from new stakeholders in order to design proper security policies. As a result, security teams are engaging IT Ops teams earlier and much more often. As organizations continue to virtualize their infrastructure, these groups do more then engage they will merge. I expect to see that happen en masse in 2014. As this occurs, my third prediction will then come into play the rise of application infrastructure managers.
For the original version including any supplementary images or video, visit http://www.scmagazine.com/2014-the-year-network-security-operations-become-orchestrated/article/326683/

Now, IT professionals responsible for such critical areas as servers, desktops, virtualization and databases can quickly and easily assess their focus area for vulnerabilities. Learn more about the entire family of Retina vulnerability management solutions during this two-minute video: https://vimeo.com/76358645 About BeyondTrust BeyondTrust is the leading security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company's products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.
For the original version including any supplementary images or video, visit http://www.darkreading.com/intrusion-prevention/beyondtrust-releases-network-security-sc/240162384

The Practice of Network Security Monitoring, review: A hands-on guidebook

nsm-book-left This book is most useful if you plan to use the recommended tools to monitor your network, but the approach applies to other tools as well. And the principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server. Since security is more about process than technology and every network is different, Bejtlich shows you how to analyse your network to find out where to do your monitoring, either with port analysis and mirroring or a hardware network tap, and how to specify the server that will do the monitoring. His suggestion for monitoring tools starts with Security Onion , a network security monitoring suite built on Ubuntu, but he covers a range of tools that work with it for analysing information further. For Windows admins, he suggests getting used to Linux. Fully covering tools like Microsoft's Network Monitor would be outside the scope of the book, but it would have been useful to include a discussion of what comparable tools are available on other platforms (Wireshark is just as useful if you're running network monitoring from Windows, for example). The conclusion does mention two cloud network security monitoring options, ThreatStack and PacketLoop , although only briefly. Plenty of books explain how to set up your network (the advice here concentrates on designing your security process), but few concentrate on what to do when the intruders arrive. Here the author walks you through what your monitoring tools will show you when you're attacked over the network, or through applications like email and web browsers. In one example, a tweet is sent with a web link that installs Java and exploits a Java vulnerability to install a keylogger, capture passwords and infect Green IT a second system.
For the original version including any supplementary images or video, visit http://www.zdnet.com/the-practice-of-network-security-monitoring-review-a-hands-on-guidebook-7000020593/

Don't be the product, buy the product!

Schweinderl