Story image

Your network is being attacked: How can you best manage it?

04 Feb 2016

Ever-expanding connectivity, digitisation and the Internet of Everything (IoE) is transforming our world, creating a Digital Economy and new business models that are fuelling new opportunities through greater speed, efficiency, and agility.

Security is a critical factor for government, corporate and enterprise organisations that want to take full advantage of these opportunities, as the increased connectivity provides greater opportunities for cyber criminals as well.

Today’s threat landscape is constantly evolving, with modern cyber crime operations that are sophisticated, well-funded and capable of causing massive disruptions to organisations and national infrastructures.

Traditional defences that rely exclusively on detection and blocking are no longer adequate. Comstor business development manager Chris Kidd affirms a solution to the increased quantity and sophistication of cyber attacks is complete visibility of your network and understanding the risks.

“Organisations need to gain visibility and control across the extended network and throughout the full attack continuum before, during and after an attack,” Kidd says.

When an attack occurs, the ability to continuously detect malware and block it is critical. Security must be continually aware, aggregating data from across the extended network and correlating it with historical patterns and global attack intelligence.

If a threat evades the first line of defences, organisations need retrospective security. By continually analysing data, they can identify indications of compromise, detect advanced malware and instantly remediate the problem.

Together with their resellers, Comstor work to extract meta data from organisation’s networks for a week or so, which allows them to capture a typical traffic profile to produce Proof of Value (POV) reports - offering their customers the opportunity to gain more visibility.

“The power of these reports, in my view, is the research and the security intelligence behind them - Cisco has the largest TALOS security research team in the world,” says Kidd.

This POV report can filter out any attacks or risks to your network that are irrelevant, which allows you to identify exactly what threats to focus on.

“The power of that intelligence combined with the understanding of the traffic within the customer’s network makes for a very relevant and valuable report,” Kidd says.

Compromises that previously would have gone undetected for weeks or months can now be remediated in minutes.

“The POV reports from Comstor can provide you with critical information,” says Kidd. “For example, you might find apps in your network that aren’t business-critical but are high-risk that you can eliminate, which users are being attacked, any dangerous web-browsing and where your bandwidth is being allocated.”

Only Cisco delivers Threat-Centric security, that reduces complexity while providing superior visibility, continuous control and advanced threat protection across the entire attack continuum.

Microsoft appoints new commercial and partner business director
Bowden already has almost a decade of Microsoft relationship management experience under her belt, having joined the business in 2010.
Zoom’s new Rooms and Meetings features
Zoom has released information about the upcoming releases for its Rooms and Meeting offerings for 2019.
Aussie company set to democratise direct-to-orbit IoT access
Adelaide-based Myriota has released a developer toolkit that has been trialled and tested by a smart waste management platform.
Apple's AirPods now come with 'Hey Siri' functionality
The new AirPods come with a standard case or a Wireless Charging Case that holds additional charges for more than 24 hours of listening time.
Dynatrace takes pole position in APM Magic Quadrant
It placed highest on Ability to Execute and furthest on Completeness of Vision in the 2019 Quadrant for Application Performance Monitoring (APM).
HCL and Xerox expand strategic partnership
Under the terms of the agreement, HCL will manage portions of Xerox’s shared services, including global administrative and support functions.
Avaya expands integration with Google Cloud AI
This includes embedding Google’s machine learning within conversation services for the contact centre, enabling integration of AI capabilities.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.