SHARE
Facebook X Pinterest WhatsApp

A New Security Approach to Combat Today’s Threats

A modern approach to security needs to start with one assumption – you have been breached. While consensus has been gaining on the breach assumption for some time, changes to security architecture have been slow. Security still operates in the traditional role of the defender, highly focused on protecting an impossible number of endpoints. Changing […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 3, 2015

A modern approach to security needs to start with one assumption – you have been breached. While consensus has been gaining on the breach assumption for some time, changes to security architecture have been slow. Security still operates in the traditional role of the defender, highly focused on protecting an impossible number of endpoints.

Changing the nature of how we think about security changes the role the defender has to play, and takes the power away from attackers. By focusing security resources on detection and containment, with a strong emphasis on network visibility, enterprises can turn the tables on cyber criminals. This new approach sends a clear message to the attackers – getting into the front door is fine, but you’ll never get out. In this slideshow, Gigamon has identified five steps organizations should take to redesign their approach to security.

A New Security Approach to Combat Today's Threats - slide 1

Reimagining Your Security Architecture

Click through for five steps organizations can take to realign their security approach to combat today’s ever-changing threats, as identified by Gigamon.

A New Security Approach to Combat Today's Threats - slide 2

Build Visibility into Multi-Tiered Network Security

Your network today is made up of physical and virtual components, yet the chances are slim that you have unified visibility across your physical and virtual assets. You need end-to-end visibility from the perimeter to the core of the data center, from remote sites to the cloud. Achieve pervasive traffic visibility with a platform that leverages network TAPs that collect traffic on both physical and virtual networks, and sends it to intelligent nodes that then process, filter, and forward traffic for your security, network, and application analyzers. This accommodates agile scalability and reconfiguration in response to evolving threats without affecting the production network.

A New Security Approach to Combat Today's Threats - slide 3

Leverage Best of Breed Solutions

Advanced persistent threats (APT) require the latest and continually updated security tools to identify attacks and protect vital resources. Specialized APT solutions are often optimized for packet intelligence more than high-speed throughput, and can thus become overwhelmed by network traffic. APT tools can be configured in n+n groups, but this adds expense and complexity. Improve secure network scale-out by applying a comprehensive visibility solution that sees all of the packets traversing all network tiers and virtualized environments. A mix of best of breed tools, managed centrally, can give you the best mix of offense and defense.

A New Security Approach to Combat Today's Threats - slide 4

Ensure Data Privacy for All Network Traffic

Network security leaders must balance tight budgets against stringent and often costly privacy protection/compliance requirements. Leverage a security delivery platform that can efficiently forward traffic to the right tools for data retention and compliance. Look for one that can mask and slice packets before they are analyzed or stored to protect the privacy and security of packet payloads.

A New Security Approach to Combat Today's Threats - slide 5

Eliminate Risks from Overtaxed Security Solutions

Here, the goal is to ensure that the existing security appliances are inspecting the right traffic at the right time to take the right corrective action. Ensure load distribution is spread intelligently across multiple appliances so they do not become overloaded and neither open the network to intrusion nor negatively impact business-critical services and applications.

A New Security Approach to Combat Today's Threats - slide 6

Protect Remote Locations

Branch offices demand secure, high-speed connectivity to enable remote workers to have persistent connections to headquarters and to the Internet from their disparate sites. However, the total cost to acquire (TCA) and total cost of ownership (TCO) of provisioning security tools at each remote location can be prohibitive. Look for ways to extend existing security solutions in the core network out to the network edge.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.