Issue link: https://insights.oneneck.com/i/1458399
CHAPTER 5 Ten Evaluation Criteria for Network Security 63 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. platform should use content-based signatures to detect variants, polymorphic malware, or C2 activity. In addition, C2 signatures based on analysis of outbound communication patterns are much more effective protective measures that can scale at machine speed when created automatically. Finally, cloud-delivered secu- rity infrastructure is critical for security enforcement. It supports threat detection and prevention at massive scale across your net- work, endpoints, and clouds in addition to allowing you to tap into an open ecosystem of trusted innovators. Flexible, Adaptive Integration One of the key integration challenges in the data center is secu- rity design. Network architectures must often be redesigned when security requirements evolve due to changing applications and threats, new compliance mandates, and shifting risk postures. A new paradigm that enables network security to be flexible and adaptive is needed. Networking flexibility helps ensure compatibility with practically any organization's data center environment. Enabling integra- tion without the need for redesign or reconfiguration depends not only on supporting a wide range of networking features and options, such as port-based virtual local area networks (VLANs), but also on the ability to integrate at the Open Systems Intercon- nection (OSI) Reference Model Layer 1 (Physical), Layer 2 (Data Link), or Layer 3 (Network). In addition, the network security solution should be able to turn on additional security features as the security posture changes. Finally, your security solution needs the ability to support multiple hypervisor types, such as VMware ESXi, Microsoft Hyper-V, Nutanix AHV, KVM, and potentially software-defined network (SDN) driven provisioning, particu- larly in hybrid cloud environments. Secure Access for Mobile and Remote Users The modern enterprise continues to become far more distributed than in the past. The mobile workforce continues to grow along with the use of mobile devices to connect to business applications,