Page 11 - CDM-Cyber-Warnings-March-2014
P. 11
.-;3 $3 2'$# 6 8 !8 3'$ $1%$"3 3.1, Paul Ginn, Director of Marketing, APCON The Internet as we know it has reached a quarter century milestone. With its founding principle of the free flow of information, we have seen innovation and great advances that have profoundly altered our daily lives. According to Anne Jellema, CEO of the World Wide Web Foundation, the Web is humanity connected. From a business perspective the web and technology trends bring business opportunities and a data deluge with enormous security challenges for network engineers and security managers alike. Are we brewing a perfect cyber storm? Being connected has a whole new language of its own. When did cyberattacks, IA vulnerabilities, malware, zero-day, denial-of-service, advanced persistent and insider threats, data sovereignty and an untrusted supply chain challenge become part of our vocabulary? Couple this with technology trends like Big Data, cloud and virtualization, BYOD, and then add privacy legislation – it’s no wonder that I, along with 28,000 industry colleagues, rushed to the RSA conference. If you haven’t been to RSA yet, this annual event in San Francisco is buzzing with information security professionals and business leaders with one objective: to find and develop solutions to track and counteract advanced threats, address new vulnerabilities, and share the growing concern for data security, privacy and compliance. Cost as always is a hot topic. During his keynote speech, Art Gilliland, Senior Vice President, HP Software Enterprise Security Products at Hewlett-Packard Company stated that organizations worldwide spent $46 Billion on cyber security in 2013, breaches increased 20%, and the cost of an individual breach increased 30%. In the enterprise world, 100-percent network visibility is one of the most critical tools for both network operations and security managers. Failure to monitor all points on the data center landscape can lead to costly outages, data security breaches and jobs. It's not a question of if any given network will be hacked – just a question of when. What is the next threat and what are organizations doing about it? The Many Uses of Taps Today enterprises strive to achieve 100-percent network visibility through Test Access Points (TAPs). Taps are components that allow monitoring of network traffic between switches, routers and other zones on the network landscape and are central to any monitoring plan given that they offer an uncensored view of all traffic. However, taps are not enough to adequately monitor a network today and anticipate a world of growing security threats and software exploits. In recent years there has been a network tap evolution with the arrival of intelligent managed taps and network monitoring switches that integrate tapping, packet aggregation, filtering, and advanced monitoring services to significantly increase awareness of network activity, improve analysis, and enable accurate forensics. Intelligent network taps enable engineers to connect more network monitoring points " # % " $ " # ! !
   6   7   8   9   10   11   12   13   14   15   16