Download your cybersecurity solution must do

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
10 THINGS
YOUR
CYBERSECURITY
SOLUTION MUST DO
Cybersecurity requires multiple
detection and prevention capabilities
to enable teams to manage risk and
mitigate attacks. As cybercrime
evolves, so must the tools and
techniques you use to secure your
organization. But, using individual
products to solve individual problems
isn’t the answer. Choosing a holistic
cybersecurity solution that can
dynamically adapt to the changing
threat landscape is vital.
1
Enforce allowed interactions between your data and users.
Your network is like a virtual highway that connects your users
to important data. With the number of roads to those data
stores increasing as organizations become more connected, the
risk of being breached skyrockets. To reduce the sheer number of
attacks on your network, you need to reduce the attack surface
by granularly identifying approved interactions between users
and data based on the specific data you’re trying to protect —
what it contains, where it’s located, how it should be used, and
by whom.
2
Identify threats on all apps, ports, users, and devices, all the time.
Complete, end-to-end threat identification for all applications, all
users and devices on and off the corporate network, and for all
network locations, is imperative for an effective cybersecurity
strategy. Know your business, know your network, know your
users – your team and your technologies can only protect your
organization from the things they can see, so choose a cybersecurity solution that gives you visibility into everything, everywhere.
1
3
4
5
7
8
9
6
10
Protect data at multiple stages in the attack lifecycle.
All threats comprise multiple stages strung together to form
the attack lifecycle, and all stages must succeed before the
attacker’s objective can be met. Solutions focused on one stage
may fail, especially when new or unknown techniques are used.
An effective prevention strategy includes technologies that
detect and prevent across each stage, easily block known threat
components, and hone in on evasive behavior to ultimately stop
attackers from reaching their end goal.
Outsmart APTs designed to outmaneuver security tools.
Advanced persistent threats (APTs) are designed to be evasive
in order to bypass security defenses. It’s incredibly easy to
fragment a payload into several packets, change a malicious file
hash, or spoof an email header. Your next cybersecurity solution
must use smart signatures capable of uncovering threats deep
within each packet, file, and web link comprehensively across
many protocols and file types, regardless of the exploit or hash,
to offer increased protection.
Facilitate the translation of new intelligence into protections.
In 60 percent of attacks, it takes only minutes for compromise
to occur, necessitating the quick translation of data into intelligence, and then into protections that are enforced. Consider a
solution that is self-learning to automate this process and reduce
it to minutes. The more relevant your intelligence is, the more
up-to-date your security protections will be, and the better able
you’ll be to successfully defend your data and make prevention
part of your cybersecurity strategy.
Stay up to date with protections against new attacks.
Threats change constantly as attackers evolve their methods to
be more deceptive and evasive. What protected your network
this morning may not be effective against attacks launched later
today. While having a dedicated threat research team is important, you need automation to keep up with the rate at which
attackers create new threats, quickly compiling data from new
attacks on your organization and around the globe into intelligence and producing protections as soon as attackers operationalize those threats.
Enable quick and accurate mitigation.
Though prevention is preferable, mitigation and remediation
cycles continue to be an important part of each organization’s
cybersecurity strategy, and when there’s an infection, every
minute counts. Your next cybersecurity solution must correlate
threat logs across each detected stage in an attack, and actively
search for and alert you to high fidelity indicators of compromise, including the identification of the infected device beyond
a simple IP address.
Coordinate actions across individual security technologies.
Security technologies and sensors throughout your network
contain information gathering and enforcement capabilities that,
if built to work together, can make your team’s efforts to secure
the organization much easier. Your next cybersecurity solution must comprehensively share intelligence across individual
technologies and features, update policies across your entire
network, and immediately alert you to infection no matter the
network location.
Keep your business running.
When it comes to choosing between securing the organization
and enabling the thousands of applications that accelerate
business efficiency and profitability, security is usually sacrificed, but it doesn’t have to be. Reducing the attack surface is
key to maintaining usability. Given the requirement for computationally intensive tasks, like application identification and
threat prevention, performed on high-traffic volumes with low
tolerance for latency associated with critical infrastructure, you
need hardware or software designed for this task.
Be easy to use.
Even with a centralized management system in place, sifting
through data from separate logs and correlating it is an enormous task. Natively integrated security technology that runs on
a single device lets you glimpse what’s going on with each data
flow and makes it simple to search for, correlate, and prioritize
critical security alerts, and granularly adjust policy based on
present events. Armed with this insight, you can quickly and
accurately locate infected devices, mitigate attacks, and achieve
cybersecurity for your organization.
Download the complete Cybersecurity Buyer’s Guide here.
For more information, visit
paloaltonetworks.com/cybersecurity
Palo Alto Networks
4401 Great America Parkway
Santa Clara, California, 95054
© 2015 Palo Alto Networks, Inc. Palo Alto Networks is a registered
trademark of Palo Alto Networks. A list of our trademarks can be found at
http://www.paloaltonetworks.com/company/trademarks.html. All other
marks mentioned herein may be trademarks of their respective companies.
+1-408-753-4000 main
+1-866-320-4788 sales
+1-866-898-9087 support
www.paloaltonetworks.com
2