02.03.2019 Views

Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

For better protection, stop<br />

buying security products<br />

by Stan Black, Chief Security and Information Officer, Citrix<br />

Do the security products you’re<br />

buying make you feel any<br />

safer? Are you fundamentally<br />

improving your security posture,<br />

or are you still just one hacker<br />

innovation away from disaster?<br />

If only questions like these were<br />

harder to answer. In reality,<br />

the traditional approach to<br />

cybersecurity just doesn’t work.<br />

Point solutions add complexity.<br />

Hackers will always move faster<br />

than their targets. Constantlychanging<br />

digital environments<br />

add potential vulnerabilities<br />

every day—and a single<br />

compromised app can bring your<br />

whole business to its knees. We<br />

can’t keep using the same tired<br />

security strategy hoping to get<br />

different results. There has to be<br />

a better way to do this.<br />

There is. Instead of throwing<br />

dozens of security products at<br />

thousands of individual apps and<br />

hoping for the best, we can take a<br />

better approach to cybersecurity.<br />

Make security frustrating for<br />

hackers—not users and IT<br />

Traditional security takes a toolby-tool<br />

approach to protection.<br />

Any user can tell you what this<br />

does to productivity; a highfriction<br />

security experience<br />

makes it harder to get work done<br />

at a time when innovation and<br />

agility have never been more<br />

critical for business success.<br />

The resulting patchwork<br />

security infrastructure also adds<br />

complexity and overhead for<br />

IT, slows threat detection, and<br />

makes it easier for attackers to<br />

find and exploit vulnerabilities.<br />

Now consider a different<br />

approach. Instead of fighting<br />

a losing battle to protect<br />

thousands of apps one-by-one,<br />

what if you built security into<br />

your infrastructure as a whole?<br />

By changing the way services are<br />

delivered, you can get security<br />

out of users’ way, simplify life for<br />

IT, and achieve a much smaller,<br />

more easily defended attack<br />

surface—no matter how much<br />

change digital transformation<br />

drives in your environment.<br />

It’s all about the pipes<br />

One of the most appealing<br />

aspects of hacking is the<br />

huge return on effort you can<br />

achieve. With 1,000 – 3,500<br />

apps running in the average<br />

organization, many of them<br />

lacking the latest security<br />

patches, it’s never hard to find a<br />

soft target to exploit. Once you<br />

breach a single app, you’re in—<br />

and you can roam the enterprise<br />

environment at will. Life is good.<br />

Hacking would be a lot less fun<br />

and rewarding if a breach only<br />

affected that individual session.<br />

You might ruin that employee’s<br />

day, but that’s about it. For the<br />

rest of the organization, it’s still<br />

business as usual.<br />

50 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!