How Security is Changing in the Evolving World
Adapting Company Security
In the advent of the infamous SONY breach, we are realizing that repercussions of not having a secure network and infrastructure can become exceedingly costly. In this new age of being highly connected to potential threats, the focus of securing IT can’t just be on fortifying the walls and keeping the bad guys out, but also extends to people who you have let in and are trusted users. There have been a couple of different ways to approach IT security moving into 2015 and beyond spanning all industries.
In President Obama’s visit to Silicon Valley, he stated his strong stance in improving encryption as a means to fortify IT security. Even before Obama, Whatsapp, the mobile messaging application, announced in November of last year that they have implemented an end-to-end encryption so that not even the company themselves can read user messages. Now with both open-source and premium encryption programs alike, encryption has been seen as one of the new focuses in increasing security in our highly connected world.
In CMI’s sponsored February’s CIO roundtable, we learned that 83% of data center traffic is now East/West. We also learned that 243 days is the median number of days advanced attackers are on the network before detection according to Gartner. A handful of applications have begun to address these issues through a distributed security solution approach. This approaches security in form of seeing the whole environment as a plane where a security solution is applied throughout to detect abnormal behavior through security analytics that spans over physical, virtual, SDN, and cloud environments.
Understanding that our clients have increasing pressures to not only provide business critical applications within a reasonable lead time, but also in a secure fashion, CMI has been increasing our security portfolio and understanding of new security concepts in the industry to stay ahead of the game. The world of IT is evolving each and every day, why shouldn’t your way of approaching security? Let’s start a discussion to see which means of approaching security best fits your needs. Come and join us at the next CISO meeting
CMI – Your Adaptable Data Center Company