The State of Segmentation in Security Architectures

"Recent data breaches have seen cybercriminals siphon off millions of records containing personally identifiable information and credit as well as debit card data, which is taking a major toll on company profits and customer loyalty. To identify the gaps in IT security that allow hackers to steal so much data, a joint UBM Tech and Certes Networks survey asked security experts how the protect their sensitive data, and specifically how they ploy segmentation technologies to shrink their attack surfaces and reduce the damage caused by a data breach.Segmentation is commonly understood as the practice of dividing or separating IT resources into their own logical or physical domains, often for the purpose of simplifying traffic management or providing security. The survey and this analysis paper focus primarily on segmentation of networks and enterprise applications that are shared on networks. 
In this report, we examine the role of segmentation in containing breaches and how it can be done more effectively. We explore the possible shortcomings of segmentation that is tied to network infrastructure. Finally, we discuss a ""software-defined"" approach to segmenting applications that decouples security enforcement from the underlying network or infrastructure and enables an enterprise to contain breaches and minimize damage should an attack occur. Download this research report to learn more.

Spotlight

SOC Prime

Founded in 2015 SOC Prime, Inc. is a fast-growing cybersecurity vendor enabling mid-to-large enterprises and Managed Security Service Providers (MSSPs) to control their SOC data quality and manage metric-driven security processes. Our clients and partners report solid increase in SOC operations performance and speed up the response to cyber threats from months to minutes. Together, we help 1300+ organizations in 115+ countries enabling fastest threat detection content delivery across the globe. Products Threat Detection Marketplace (TDM) is the first global cross-platform marketplace developed by security incident responders for fastest threat detection content delivery to CISO’s, SOC Managers and Analysts. Start for free at https://tdm.socprime.com/ Read more at https://my.socprime.com/en/tdm/

OTHER WHITEPAPERS
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More

Spotlight

SOC Prime

Founded in 2015 SOC Prime, Inc. is a fast-growing cybersecurity vendor enabling mid-to-large enterprises and Managed Security Service Providers (MSSPs) to control their SOC data quality and manage metric-driven security processes. Our clients and partners report solid increase in SOC operations performance and speed up the response to cyber threats from months to minutes. Together, we help 1300+ organizations in 115+ countries enabling fastest threat detection content delivery across the globe. Products Threat Detection Marketplace (TDM) is the first global cross-platform marketplace developed by security incident responders for fastest threat detection content delivery to CISO’s, SOC Managers and Analysts. Start for free at https://tdm.socprime.com/ Read more at https://my.socprime.com/en/tdm/

Events