How to Navigate the Common Pitfalls of Security Policy Management

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next How to Navigate the Common Pitfalls of Security Policy Management-4 Next

Take an Application-Centric Approach

The number one trigger for a policy change is a change to a business application, so you need to think about security from the application perspective. Visually map application flows (using a network topology map) so you can see how data flows across the network, what's not working and where traffic is blocked. If you focus on the application first and figure out how traffic needs to flow, you can easily understand what each application needs in terms of connectivity to function and deliver its business benefits, while ensuring security.

It comes as no surprise to security practitioners that managing security is becoming more and more demanding. Organizations are facing more threats, greater complexity and increased demand for both security and application connectivity. While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect their security policy management basics.

In his years of interactions with companies across pretty much every geography and industry vertical, Nimmy Reichenberg, vice president of strategy at AlgoSec, has found that going back to the basics is key when managing an effective security policy and a crucial first step in making your organization more responsive, agile, compliant and secure. In this slideshow, Reichenberg has identified seven common pitfalls organizations face and tips for how to deal with them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.