fbpx

Integrating Perimeter and Inner Defenses: 5 Facts THAT COULD or MIGHT NOT Surprise

This website has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security


IDC recently had the chance to speak to CISOs concerning the integration of Cisco Secure Secure and Workload Firewall. As analysts, we are able to articulate the technical benefits. The realized benefits could be different when real-life time and budget constraints are applied. Our conversations were illuminating quite. Here are 5 realities that could or might not surprise you with regards to integrating perimeter and internal defenses:

    1. Time may be the currency of your day -Ransomware, cryptomining, and offer chain attacks are top of mind until we enter the working office; throughout the day business needs drive the fires to be fought. The ever-present have to move to stay before cybercriminals require tools to “just work quickly. ” Based on the CISOs we spoke with, “if you’re limited on don’t and funds have a 20-person security team, you should do a lot quickly…being in a position to get these overlapping protections…and they’re speaking with one another really shines.”
    1. Perimeter and internal defenses isn’t an “either-or” issue; it really is an “and” issue -Firewalls have a prime vantage point, having the ability to observe all traffic traversing into and out of our infrastructure. But internal defenses certainly are a bit more complicated. Digital transformation though will not await pristine security policies and measures to be placed in place. Rather, digital transformation can force us to wrap devices or application like workloads and IoT devices in zero-trust policies elegantly or inelegantly; digital transformation will not care. Based on the CISOs, “For organizations like hospitals which have IoT devices and new technologies, it’s likely to be hard to wrap policies around those devices. You’ve got some new scanner or perhaps a new handheld; how will you protect and lock them down? You can’t put a realtor on many of them maybe. So in times like that, with this particular [Secure Workload + Secure Firewall integration] it is possible to wrap a zero trust policy around securing those devices.”
    1. Integration is real -Let’s acknowledge the elephant in the area; vaporware is really a expressed word for grounds. In this situation though, the integration of perimeter and internal defenses is actually happening already .  The integration is certainly going beyond an individual pane of glass management console and being driven by way of a real have to solve real problems. Based on the CISOs, “You may get that data from the firewall and you should use that data to wrap a Tetration [Cisco Secure Workload] workload protection policy around those, lacking any agent on the website even.”
    1. Integration enables automation -Time poverty is omnipresent. The ultimate goal of security is automation, which isn’t possible without deep integration. Based on the CISOs, “I could have one block list in SecureX. When I right select an IP SHA-256 or address, I’ve got some automation create and block it at the AMP level, the firewall level, and a genuine number of places, Stealthwatch…everywhere.”
    1. “One throat to choke” -Budget, management and time constraint are real and painful. The CISO of a high 10 bank may not serve these masters, however the CISOs with whom we spoke do. Deeper discounting, simplified buying process, and a “one throat to choke” are intangible, but invaluable great things about integration. Based on the CISOs, “With one company, it creates it a whole lot better to get people to interact.”

Integration is really a key facet of digital transformation, and in the security realm often means the difference between an intrusion attempt and a data breach. However, integration must mean a lot more than simple co-existence. True integration shall improve workflows, productivity, and security outcomes. The known degree of integration between perimeter and internal defenses may be the difference maker, as CISOs continue steadily to navigate emerging and new threats, technologies, and business requirements.

For additional information with this integration, please visit:  https://www.cisco.com/go/NetWORKvision

Find out more from IDC in this Cisco-sponsored whitepaper

We’d want to hear everything you think. Ask a relevant question, Comment Below, and Stay Linked to Cisco Secure on social! Cisco Secure Social Channels Instagram
Facebook
Twitter
LinkedIn