Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 30 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

FireMon profile – Satin H. Mirchandani: a good firewall is like the spider in the web

by The Gurus
March 10, 2017
in Editor's News
Share on FacebookShare on Twitter

Organisations struggle to defend themselves against today’s clever cyberattacks. Often, it’s due to a combination of an overly complex web of security infrastructure with no common management platform and a lack of skills to make managing these technologies effective. It’s an orthodoxy repeated over and over, most vociferously by a horde of companies marketing the latest technology that earnestly promises to make it all go away.
It’s a description of the problem that FireMon’s new CEO, Satin H. Mirchandani, refuses to take at face value. At best, it states the obvious, he says, at worse it leads companies to completely misunderstand what they are up against and what they can do to secure themselves.
The first fallacy is that breached organisations can’t ‘see’ what’s happening to them when in fact they can. What they can’t discern is which alerts emerging from their expensive security infrastructure matter and which don’t. This is because there are often too many of them, a level of noise that drowns out the indicators of compromise. It’s a security model that can sometimes turn defence into a glorified form of forensics where the ‘gotcha’ happens days, weeks or months after the moment it might have been useful.
The second fallacy is simply that the above can be stopped by throwing enough money and expertise at defence.
“Assume that your network has been breached,” he responds, bluntly. “It’s a question of how quickly you can find it and how you respond.” The battle is always about shortening response times rather than pretending that attackers can be kept out indefinitely.
Time and again, when disaster visits, it’s as if companies are surprised by what is happening to them. According to Mirchandani, the problem at those moments is rarely one of technology so much as the security management, processes and mindset that ultimately divide the smart from the doomed. Cybersecurity should always be about rational knowledge and not blind hope.
Firewalling evolves
Mirchandani arrived at FireMon in mid-2016 as the latest instalment in a career that started at McKinsey before taking in senior positions at healthcare supply chain outfit MD Buyline and pcOrder.com. However, the key to understanding his background is his 2002 co-founding of MessageOne, bought in 2008 by his next employer, Dell.
MessageOne wanted to take the pain out of email by turning it into something that could be consumed as a service. Years later, FireMon wants to perform a similar taming of that other business staple, the corporate firewall, a device that has in most organisations grown into a huge estate of virtual and physical devices spreading as far as most admins can see.
The complex evolution of the firewall is something Mirchandani alludes to a lot. Another way to understand this history is to see it as being about the changing notion of what constitutes an anomaly. Twenty years ago, it was about closing network ports and protocols. A decade later it had moved on to monitoring users and applications. Nowadays, the top systems function as the core of multi-sensor platforms that attempt to “triage” multiple indicators of compromise. If these systems and sensors are akin to a web, the firewall is still like the spider sitting in the middle, waiting for movement. It is the place where defenders try to make sense of what is going on.
“Systems are generating gigantic numbers of alerts – they are suffering from alert fatigue and it’s very difficult to figure out which ones deserve attention. And so you have this false positive problem,” says Mirchandani.
“But if you were able to triage down to the half a percent that were worth looking at the problem would get a lot more solvable.”
It sounds straightforward, but what does this tiny fraction of genuine anomalies actually look like?
“We don’t know what the anomalies look like. So (our tool) stitches together multiples sets of data and goes off and figures out which ones look anomalies.”
You could argue this is an ironic situation for a cybersecurity industry that has built its business models on the back of generating alerts almost as an end in itself. But like a fire alarm that goes off every time the temperature rises, at some point the sheer volume passes the level where they stop being useful.
FireMon’s philosophy isn’t to pass judgement of the alert-driven SIEM model, simply to filter this vast set of data into something more manageable. It’s an important new capability for FireMon, becoming part of its platform when it acquired startup Immediate Insight in early 2015.
Alerts themselves, of course, are simply a visible part of the larger issue of growing complexity. A recent solution to this is what is called ‘zero trust’ network, one in which no assumptions are made about devices, users, or where they are connecting from. On a zero trust network, everything is a risk, which delivers greater simplicity in terms of policy design.
“With cloud, Software Defined Networking and microservices, the complexity has gone up exponentially. The ability to automate firewall rule changes is really important but there’s a big caveat which is there has been a rush to automation. That can be dangerous.”
Mirchandani’s point seems to be that zero trust requires greater automation but that can morph into another kind of risk if it simply generates new assumptions of its own.
“Some activities will be fully automated and others will always require a human interface even if it’s someone looking at the results of a simulation.
“The risk isn’t that you do it too slowly but that you make some sort of unforced error and permit access that shouldn’t be permitted. Our focus is all around simulating and modelling what those changes would have on the environment,” he says.
“You must do the simulation before you hit the commit button.”
This is an important moment for the company. FireMon’s heritage is as a maker of tools for large organisations to manage firewall rules and policies across different brands of underlying equipment, known in the trade as ‘heterogeneous networks.’ The success of the concept was that it could overcome the risk that networks turn into silos built from different management consoles.
This is particularly important when installing a new firewall because it means re-assessing as well as migrating old policies and rules. It’s a golden chance for some fresh thinking, using a tool to help with the process.
“Our focus – what we call Intelligent Security Managment – is all about simulating and modelling ahead of time what changes would wreak on the environment.”
This will represent a culture change for security teams and their precious firewalls. Long gone are the days when an admin would define a policy and simply enact it through a series of rules. Increasingly, on a zero trust model, they will need to model complex policies, automating them where that is possible. This world will require work and a loss of innocence.
“What we have discovered through working with over 1,500 customers, there really is no easy button.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Google Chrome 57 Released with WebAssembly Support, 36 Security Fixes

Next Post

Prpl Foundation tackles how to secure the Internet of Things at Embedded World 2017

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information