Intelligent CISO Issue 08 | Page 16

latest intelligence SCALING NETWORK SECURITY R RIP, the moat Young people today laugh at folks with a couple of decades of experience when they rue about the good old days, when networks snaked along the floors of offices (shout out for Thicknet!) and trusted users were on the corporate network, while untrusted users were not. PRESENTED BY DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS 16 Suffice it to say the past 25 years have seen some rapid changes to technology infrastructure. First of all, in a lot of cases, there aren’t even any wires. That’s kind of a shocking concept to a former network admin who fixed a majority of problems by swapping out patch cords. On the plus side, with the advent of wireless and widespread network access, you can troubleshoot your network from the other side of the world. We’ve also seen continuing insatiable demand for network bandwidth. C M Y CM MY CY CMY K Networks grow to address that demand every year, which stresses our ability to protect them. But network security solutions still need to inspect and enforce policies, regardless of how fast the network gets. Looking for attack patterns on today’s networks requires an entirely different amount of computing power than it did in the old days. So an essential requirement is to ensure that your network security controls can keep pace with network bandwidth, which may be Mission: Impossible. Something has to give at some point to keep the network secure. In this Scaling Network Security paper, we will look at where secure networking started and why it needs to change. We’ll present requirements for today’s networks which will take you into the future. Finally we will wrap up with some architectural constructs we believe can help scale up your network security controls. u Issue 08 | www.intelligentciso.com