eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 24 of 52

CHAPTER 3 Building the "New Best-of-Breed" Security Architecture 19 These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. virtual private networks (VPNs) are no longer able to fully protect devices and corporate data. Many cloud-based services (such as Salesforce.com and Office 365) can be conveniently accessed without a VPN connection, leaving these applications and data with only basic security, such as antimalware protection. According to Gartner, by 2018, 25 percent of corporate data traffic will bypass perimeter security and flow directly from mobile devices to the cloud. Modern security solutions need to enable your business to embrace the cloud and work from any device, anywhere, at any time — extending existing protection well beyond the traditional network perimeter. » There's a lack of visibility. Traditional port-based firewalls are blind to many threats that use evasive techniques such as nonstandard ports, port hopping, and encryption. » There isn't enough segmentation and traditional segmentation can be challenging. Networks are com- monly segmented into "trusted" and "untrusted" zones with static virtual LANs (VLANs) defined on switches, which can be hard to configure and maintain. This arbitrary structure doesn't address the new normal in modern data centers — virtual machines (VMs) that move dynamically throughout and across data centers and in the cloud. Instead, multiple granular segmentation (including micro-segmentation) needs to be defined on network devices throughout the data center with dynamic software-defined segmentation. » Static updates are only a starting point. Downloading and installing anti-malware signature files is only a starting point for effectively fighting today's rapidly evolving zero-day threats. Static signature files need to be bolstered with real-time, cloud-based threat intelligence. Defining the "New Best-of-Breed" Security Architecture To safeguard businesses against ransomware and other modern threats, a "new best-of-breed" security architecture leverages an integrated, portfolio-based approach that is simple, open,

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook