Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 25 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

It’s Time to Think Differently About Segmentation

by The Gurus
March 5, 2018
in This Week's Gurus
Share on FacebookShare on Twitter

As data breaches continue to significantly multiply, so security becomes an even bigger priority for organisations dealing with sensitive data. The network perimeter, which is the boundary for both the private and the public sides of the network, used to be considered impregnable. However, now it has been degraded by advanced threats and an explosion in the number of connected devices (and applications running on them) connecting to a plethora of applications and services located in a multitude of different locations.  As a consequence, a new generation of predatory malware attacks are now getting through the traditional network perimeter.

Everything and everyone is accessible

Since the dawn of the networking era, enterprises built open (flat) networks to offer every user access to almost every application. Many of these networks are global, spanning business units and national boundaries with unprecedented connectivity. Which is good, right? Because this means that everything and everyone is accessible. However, today that very same access is now available to our adversaries. In fact, some enterprise networks have become a kind of playground for hackers in that they offer up everything to everyone with minimal effort, not even the need to wait in line. With a few easily available tools or tactics adversaries can penetrate business critical applications and data. Put simply, all they need to do is compromise one of a growing population of connected devices.

From that single compromised device, attackers can then access other devices, servers and even printers to establish a robust foothold inside the network. From there they search for privileged users to get privileged access to servers, applications and data. Security professionals have been advised to segment their networks in order to defeat these types of compromises, but traditional network-based segmentation approaches have failed.  Data centre segmentation is only effective if combined with a method to control user access to data centre partitions, which is difficult-to-impossible using traditional network segmentation techniques. Even if security professionals segment (or isolate) applications so they cannot be easily reached by adversaries, yet still be reachable by employees, the problem is that this still provides too much access, which results in stolen credentials, and the ability for compromised devices to access servers from inside the network.

Drilling deeper into segmentation

So yes, segmentation has become the new perimeter strategy, and it should begin with the protection of applications and servers from attacks from compromised endpoints.  But Chief Information Security Officers (CISOs) have been “educated” by PCI compliance to think of server segmentation as a priority, instead of protecting servers from the most common threats.

According to a recent paper, Segmentation for Security by Silicon Valley veteran Brent Bilger, “traditional network segmentation, both in the data centre and the access network, is ineffective at thwarting adversaries’ ability to move laterally through the network to access valuable data, once they gain an internal foothold.”  Unfortunately, this kind of segmentation does not set a proper barrier at the interface between users and servers.

So what kind of segmentation does help to prevent risk?

Again, according to Brent Bilger: “A trust-aware access control barrier. Its access control system acts based on deep and extensive knowledge about the user, the device being used, its location, and the sanctity of the software on that device.”

The barrier can verify users’ identity by using a multifactor method, authorising the use of an application before they access it. Also, as mentioned above, the access control system can verify the client security software to make sure it is secure and not compromised or compromising. Besides, the trust-aware access control barrier prevents adversaries, who are trying to get access to servers, applications and data by gaining a foothold, from proceeding any further.

By deploying a “trust-aware” boundary between the corporate access network and the data centre (or other areas where servers are deployed), zero-trust partitions can be deployed economically to insulate critical applications from compromises and attempted breaches that might be occurring throughout other areas of the corporate network.  

Here at Vidder, we provide trusted and unified access control across internal networks, clouds, and external users. Our Precision Access solution delivers what is in effect ‘a segment of one’ – in other words a device, a user, and an application combined as a single segment – meaning it’s invisible to everyone on the untrusted network. It then validates user authenticity and authorisation, and device trustworthiness and connects the authorised user and trusted device to only the protected applications. So not only is the security enhanced but also cost and complexity are reduced via a single layer of software-defined enforcement for IT, and a transparent experience for users.  So, as you can see we are approaching segmentation slightly differently and by doing so we are only giving access to a trusted source.   With the network perimeter no longer keeping threats out, now is the time to think differently about segmentation.

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweetShare
Previous Post

Spectre and Meltdown: Firmware flaws finally factor into security strategies

Next Post

Russians used Propaganda in Reddit to Influence 2016 US Elections

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information