Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
10 THINGS YOUR CYBERSECURITY SOLUTION MUST DO Cybersecurity requires multiple detection and prevention capabilities to enable teams to manage risk and mitigate attacks. As cybercrime evolves, so must the tools and techniques you use to secure your organization. But, using individual products to solve individual problems isn’t the answer. Choosing a holistic cybersecurity solution that can dynamically adapt to the changing threat landscape is vital. 1 Enforce allowed interactions between your data and users. Your network is like a virtual highway that connects your users to important data. With the number of roads to those data stores increasing as organizations become more connected, the risk of being breached skyrockets. To reduce the sheer number of attacks on your network, you need to reduce the attack surface by granularly identifying approved interactions between users and data based on the specific data you’re trying to protect — what it contains, where it’s located, how it should be used, and by whom. 2 Identify threats on all apps, ports, users, and devices, all the time. Complete, end-to-end threat identification for all applications, all users and devices on and off the corporate network, and for all network locations, is imperative for an effective cybersecurity strategy. Know your business, know your network, know your users – your team and your technologies can only protect your organization from the things they can see, so choose a cybersecurity solution that gives you visibility into everything, everywhere. 1 3 4 5 7 8 9 6 10 Protect data at multiple stages in the attack lifecycle. All threats comprise multiple stages strung together to form the attack lifecycle, and all stages must succeed before the attacker’s objective can be met. Solutions focused on one stage may fail, especially when new or unknown techniques are used. An effective prevention strategy includes technologies that detect and prevent across each stage, easily block known threat components, and hone in on evasive behavior to ultimately stop attackers from reaching their end goal. Outsmart APTs designed to outmaneuver security tools. Advanced persistent threats (APTs) are designed to be evasive in order to bypass security defenses. It’s incredibly easy to fragment a payload into several packets, change a malicious file hash, or spoof an email header. Your next cybersecurity solution must use smart signatures capable of uncovering threats deep within each packet, file, and web link comprehensively across many protocols and file types, regardless of the exploit or hash, to offer increased protection. Facilitate the translation of new intelligence into protections. In 60 percent of attacks, it takes only minutes for compromise to occur, necessitating the quick translation of data into intelligence, and then into protections that are enforced. Consider a solution that is self-learning to automate this process and reduce it to minutes. The more relevant your intelligence is, the more up-to-date your security protections will be, and the better able you’ll be to successfully defend your data and make prevention part of your cybersecurity strategy. Stay up to date with protections against new attacks. Threats change constantly as attackers evolve their methods to be more deceptive and evasive. What protected your network this morning may not be effective against attacks launched later today. While having a dedicated threat research team is important, you need automation to keep up with the rate at which attackers create new threats, quickly compiling data from new attacks on your organization and around the globe into intelligence and producing protections as soon as attackers operationalize those threats. Enable quick and accurate mitigation. Though prevention is preferable, mitigation and remediation cycles continue to be an important part of each organization’s cybersecurity strategy, and when there’s an infection, every minute counts. Your next cybersecurity solution must correlate threat logs across each detected stage in an attack, and actively search for and alert you to high fidelity indicators of compromise, including the identification of the infected device beyond a simple IP address. Coordinate actions across individual security technologies. Security technologies and sensors throughout your network contain information gathering and enforcement capabilities that, if built to work together, can make your team’s efforts to secure the organization much easier. Your next cybersecurity solution must comprehensively share intelligence across individual technologies and features, update policies across your entire network, and immediately alert you to infection no matter the network location. Keep your business running. When it comes to choosing between securing the organization and enabling the thousands of applications that accelerate business efficiency and profitability, security is usually sacrificed, but it doesn’t have to be. Reducing the attack surface is key to maintaining usability. Given the requirement for computationally intensive tasks, like application identification and threat prevention, performed on high-traffic volumes with low tolerance for latency associated with critical infrastructure, you need hardware or software designed for this task. Be easy to use. Even with a centralized management system in place, sifting through data from separate logs and correlating it is an enormous task. Natively integrated security technology that runs on a single device lets you glimpse what’s going on with each data flow and makes it simple to search for, correlate, and prioritize critical security alerts, and granularly adjust policy based on present events. Armed with this insight, you can quickly and accurately locate infected devices, mitigate attacks, and achieve cybersecurity for your organization. Download the complete Cybersecurity Buyer’s Guide here. For more information, visit paloaltonetworks.com/cybersecurity Palo Alto Networks 4401 Great America Parkway Santa Clara, California, 95054 © 2015 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. +1-408-753-4000 main +1-866-320-4788 sales +1-866-898-9087 support www.paloaltonetworks.com 2