eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 23 of 52

18 Ransomware Defense For Dummies, Cisco Special Edition These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Many organizations today have deployed a hierarchical network architecture consisting of an access, distribution, and core layer with multiple standalone security products, deployed in a DMZ or local services zone, such as a firewall and/or web proxy server. Unfortunately, this is not the same thing as true "defense in depth" (see Figure 3-1). Limitations with current approaches include the following: » There's no integration or correlation. Too many stand- alone security products inevitably inundate limited security resources with verbose, uncoordinated information that can't be easily analyzed and leaves security teams looking for the proverbial "needle in a haystack." » Perimeter-based security is only one part of an effective architecture. Firewalls, secure web gateways, and sandbox- ing technology deployed at the network edge only sees north–south traffic traversing the Internet. East–west traffic in the data center — traffic between applications and end users that never traverses the Internet — can account for as much as 80 percent of all network traffic, so complete visibility across the entire network is needed. » Employees have left the building. Not only have cybercriminals changed the way they work (their tactics and techniques), but the way in which our users work and interact digitally has also changed. With more remote and roaming on-the-go users working directly via the cloud on various devices, perimeter-based security technologies and FIGURE 3-1: Security is about managing risk through layers.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook