SHARE
Facebook X Pinterest WhatsApp

Security Threats: 5 Common Network Blind Spots

Enterprise networks are changing at a rapid pace – becoming more complex as next-generation advancements transform traditional architectures. Simultaneously, enterprises of all kinds and across all industries are coming to the sobering conclusion that with these changes, the traditional approach to cybersecurity is no longer effective. Perimeter defenses, while still necessary, are no longer sufficient […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 24, 2016

Enterprise networks are changing at a rapid pace – becoming more complex as next-generation advancements transform traditional architectures. Simultaneously, enterprises of all kinds and across all industries are coming to the sobering conclusion that with these changes, the traditional approach to cybersecurity is no longer effective.

Perimeter defenses, while still necessary, are no longer sufficient in the face of this once inconceivable, but now irrefutable, reality: Breaches will occur. Where cyber attacks of the past were intentionally grandiose and overt, today’s attackers more often prefer to move low and slow, creating command and control channels through which to steal valuable information over long periods of time while remaining undetected.

With these changes a new security paradigm is emerging, one that charges security and network professionals not only with keeping threats out, but also with gaining and maintaining visibility over what’s already inside their networks; however, the increasing complexity of networks creates blind spots that make seeing these threats more difficult than ever. What’s more, these blind spots are caused by a number of factors and often create bottlenecks that can degrade network performance. In this slideshow, Gigamon has highlighted the most common causes of network blind spots.

Security Threats: 5 Common Network Blind Spots - slide 1

Watch Out for the Blind Side

Click through for the five most common network blind spots that can put organizations at risk, as identified by Gigamon.

Security Threats: 5 Common Network Blind Spots - slide 2

Enterprise Mobility

Enterprise mobility has created blind spots in two ways – the massive increase in traffic hitting mobile infrastructure and the amount of new devices popping up on the network. While the high volume of traffic caused by mobile devices is certainly an issue, the much larger problem is the new threat vectors created by mobile devices, and the fact that many networks do not or cannot monitor their activity.

Security Threats: 5 Common Network Blind Spots - slide 3

Encrypted Traffic

SSL-encrypted traffic is a fast-growing portion of all enterprise traffic. According to an independent study done by NSS Labs, anywhere from 25 to 35 percent of enterprise traffic is encrypted in SSL, and that number is only growing. While inline devices like firewalls have integrated SSL support, out-of-band monitoring, performance management and security tools often do not have that ability, or if they do, not at speeds that don’t dramatically reduce network performance.

Security Threats: 5 Common Network Blind Spots - slide 4

Rise of Virtualized Infrastructure

Enterprises struggle to monitor virtualized infrastructure in comparison to physical infrastructure and its proliferation and ability to scale rapidly intensifies this problem. Combine that with the ongoing drive to adopt SDN frameworks and the disruption that has caused in the data center and it’s easy to see where blind spots are created.

Security Threats: 5 Common Network Blind Spots - slide 5

Internet of Things

The Internet of Things is putting more devices onto networks, and these devices are talking. In the popular imagination, the Internet of Things is smart thermostats and refrigerators, but in business, especially in manufacturing, the Internet of Things can mean any number of connected devices. And not all of these devices are the latest and greatest hardware. It is extremely difficult to ensure that all devices are accounted for and monitored. Additionally, the older systems that are difficult to monitor are also the ones that are most at-risk for breaches – think SCADA systems in the energy sector.

Security Threats: 5 Common Network Blind Spots - slide 6

Shadow IT

There’s a simple saying – you can’t secure what you can’t see. Shadow IT comes into the enterprise as an unknown and, in many cases, stays unknown. While Shadow IT is perhaps best thwarted by more proactive and transparent communication between IT departments and line-of-business managers, it still needs to be dealt with by administrators who need to track and monitor applications and services.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.