Start with a fabric – Why your security needs it

Start with a fabric – Why your security needs it

The explosion of network edges—data center, LAN, LTE/5G, OT, CASB, SASE, and WAN—continue to expand and splinter the perimeter. And new attack vectors, such as home networks, off-net devices, and digital supply chains, require organizations to engage in cyber war on multiple fronts simultaneously. While some of these new environments that need protection are being added to address urgent business requirements, others enjoy a level of trust they do not deserve and therefore fly under the radar.

In all cases, given the rate of innovation, there is rarely enough time to make them part of a cohesive or comprehensive security strategy. In fact, nearly 80% of organizations are introducing innovations faster than their ability to secure them against cyberattacks.

And when security is deployed ad hoc to try and keep up, the resulting vendor and solution sprawl creates complexities that further limit visibility and restrict control. This creates far more than just a management or logistical challenge.

Cyber criminals are spending time and energy looking for new ways to circumvent security controls, infiltrate networks, and achieve their objectives. To do this, their attacks are gaining in sophistication. New attacks target different network edges simultaneously to obscure their attack methods and identify the most easily exploited link in the security chain. Some are even leveraging cloud compute resources to deliver polymorphic attack sequences at rapid scale and with full automation. Few distributed networks that rely on traditionally isolated point products are able to see, let alone counter, these sorts of threats.


Traditional Security Solutions and Strategies Do Not Work

The clear challenge is that the disconnected and isolated security tools put in place to secure rapidly expanding and multiplying network edges don’t work together. This disconnection creates security and performance gaps that make it impossible to see and respond effectively to sophisticated and distributed attack sequences. And even if a security team happens to stumble across an attack in progress, and can marshal enough resources to fight it off, there is no way to preserve that intelligence to fend off the next attack.

The reason this is happening is because much of the digital innovation being put in place is being deployed piecemeal, which means there is no unifying security strategy or framework to hold things together. Instead, most organizations have accumulated a wide variety of isolated security tools designed to monitor a specific function or protect one segment of the network in isolation. This leaves overburdened security teams with the responsibility of correlating, identifying, and manually responding to the full attack sequence. But relying on humans to look for and respond to attacks that can often be measured in microseconds is a recipe for disaster. It’s part of the reason why, during the last six months of 2020, there was a sevenfold increase in ransomware attacks.

Solutions and hybrid deployment sprawl across hardware, software, and “X-as-a-Service” models have made maintaining network wide visibility and consistent policy enforcement next to impossible, let alone maintaining and monitoring the various security and networking solutions in place. This has been made even less effective as cyber criminals develop more sophisticated attack strategies designed to exploit these limitations, along with new, innovative Cybercrime-as-a-Service strategies that compound the effectiveness and volume of attacks.

In the next installment, we will expose 5 keys to developing an effective security strategy.

About us


Softelinet Soluciones Tecnológicas C.A., is a company that integrates IT services. This company is born due to the necessity within organizations to generate technological solutions that will leverage your business growth. In regards with strategic alliances with high profile companies in the field we define, develop and run projects of high technological impact.