Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
For better protection, stop<br />
buying security products<br />
by Stan Black, Chief Security and Information Officer, Citrix<br />
Do the security products you’re<br />
buying make you feel any<br />
safer? Are you fundamentally<br />
improving your security posture,<br />
or are you still just one hacker<br />
innovation away from disaster?<br />
If only questions like these were<br />
harder to answer. In reality,<br />
the traditional approach to<br />
cybersecurity just doesn’t work.<br />
Point solutions add complexity.<br />
Hackers will always move faster<br />
than their targets. Constantlychanging<br />
digital environments<br />
add potential vulnerabilities<br />
every day—and a single<br />
compromised app can bring your<br />
whole business to its knees. We<br />
can’t keep using the same tired<br />
security strategy hoping to get<br />
different results. There has to be<br />
a better way to do this.<br />
There is. Instead of throwing<br />
dozens of security products at<br />
thousands of individual apps and<br />
hoping for the best, we can take a<br />
better approach to cybersecurity.<br />
Make security frustrating for<br />
hackers—not users and IT<br />
Traditional security takes a toolby-tool<br />
approach to protection.<br />
Any user can tell you what this<br />
does to productivity; a highfriction<br />
security experience<br />
makes it harder to get work done<br />
at a time when innovation and<br />
agility have never been more<br />
critical for business success.<br />
The resulting patchwork<br />
security infrastructure also adds<br />
complexity and overhead for<br />
IT, slows threat detection, and<br />
makes it easier for attackers to<br />
find and exploit vulnerabilities.<br />
Now consider a different<br />
approach. Instead of fighting<br />
a losing battle to protect<br />
thousands of apps one-by-one,<br />
what if you built security into<br />
your infrastructure as a whole?<br />
By changing the way services are<br />
delivered, you can get security<br />
out of users’ way, simplify life for<br />
IT, and achieve a much smaller,<br />
more easily defended attack<br />
surface—no matter how much<br />
change digital transformation<br />
drives in your environment.<br />
It’s all about the pipes<br />
One of the most appealing<br />
aspects of hacking is the<br />
huge return on effort you can<br />
achieve. With 1,000 – 3,500<br />
apps running in the average<br />
organization, many of them<br />
lacking the latest security<br />
patches, it’s never hard to find a<br />
soft target to exploit. Once you<br />
breach a single app, you’re in—<br />
and you can roam the enterprise<br />
environment at will. Life is good.<br />
Hacking would be a lot less fun<br />
and rewarding if a breach only<br />
affected that individual session.<br />
You might ruin that employee’s<br />
day, but that’s about it. For the<br />
rest of the organization, it’s still<br />
business as usual.<br />
50 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>