02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Critical Role TAPs Play in Network Security and Resiliency<br />

By Alastair Hartrup, CEO, Network Critical<br />

Networks continue to be under persistent attack. As a matter of fact, according to <strong>Cyber</strong>Edge's <strong>2019</strong><br />

<strong>Cyber</strong>threat <strong>Defense</strong> Report, the percentage of organizations breached in the past year increased to 78<br />

percent year-over-year. Worse, 32 percent of businesses reported being breached more than 6 times in<br />

the last 12 months, up from 27 percent in the previous year.<br />

These attacks take many forms including phishing, ransomware, trojans, DDoS and other destructive<br />

malware. And, the motivations for these attacks are as disparate as the threats themselves. Bad actors<br />

are perpetrating attacks for financial gain, political influence, competitive advantage and sometimes just<br />

to rage against the system. Whatever the motivation, hacking is a significant problem that’s impacting<br />

productivity and costing organizations billions of dollars every year. Despite all of this troubling news,<br />

progress is being made to combat network attacks.<br />

The growth in criminal attacks on networks is paralleled by significant growth and technological advances<br />

in the cybersecurity appliance industry. There are many specialized network tools that help reduce the<br />

threat landscape by identifying and blocking attacks. For example, Data Loss Protection solutions, Next<br />

Generation Firewalls and Unified Threat Management Appliances, Network Analytics platforms, ID and<br />

Encryption appliances, and more. In addition, AI and machine learning technologies are making<br />

advances in processing millions of security events, new predictive analysis technologies are identifying<br />

known threats, and advanced network monitoring appliances are providing traffic flow visibility and<br />

analysis.<br />

But ensuring visibility is becoming more challenging as networks move away from centralized<br />

architectures. Cloud, hybrid-cloud and remotely hosted applications are driving new types of business<br />

activity. Interconnection between users and the remotely hosted information they seek requires multiple<br />

links to the internet, corporate intranets, data centers and cloud carriers. It’s no longer economically<br />

feasible to attach every security appliance directly to every single network link.<br />

111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!