Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Conventional IT security is failing: Continuous monitoring and mitigation can help

Jack Marsal | March 12, 2015
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

When discussing their model for the Adaptive Security Architecture, Gartner says: "The end result should not be 12 silos of disparate information security solutions. The end goal should be that these different capabilities integrate and share information to build a security protection system that is more adaptive and intelligent overall."

Sharing contextual information between and among different security and IT management systems reduces the problem of information silos and facilitates automated remediation. This allows IT organizations to better leverage their existing infrastructure investments, efficiently preempt and contain exposures and enhance their overall security postures.

Traditional IT security tools and practices are too focused on agents, occasional assessments, disparate point solutions and manual response. Enterprises should adjust their security architectures to better align with today's evolving IT environments and threat landscape. IT should move in the direction of security architectures that emphasize: continuous monitoring, fast, automated response to violations, exposures and indications of compromise (IoC) and integration between multi-vendor security and management systems to share security intelligence and enhance control context.

Adopting a continuous monitoring and mitigation approach isn't a vision — it's already implemented worldwide by various organizations. Moving towards a similar architecture can help keep enterprises' and government agencies' names out of the papers as the next big breach victim. Leave those headlines to those who have fallen behind.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.