FEATURE
Knowing whether you’re the type of
company that would be targeted for a
specific reason is valuable and being
able to share intelligence with similar
companies protects you all.
encompasses traditional servers, PCs,
laptops mobile devices (both BYOD and
corporate issued), cloud environments
and IoT devices like printers, scanners,
point-of-sale handhelds and even
wearables. Adversaries don’t just
target one type of device – they launch
organised campaigns across your entire
environment to establish a foothold and
then move laterally.
If for example, another company in
your field was hit for specific intellectual
property you could greatly increase
your resiliency to the same problem
by knowing the details of how they
were compromised.
Security is in everyone’s best interest
and the more open and honest we are
within our industries, the more collective
immunity we’ll have from threats.
SCOTT
SCOTT MANSON,
MANSON, MANAGING
MANAGING
DIRECTOR,
DIRECTOR, MIDDLE
MIDDLE EAST
EAST AND
AND
TURKEY
TURKEY AT
AT MCAFEE
MCAFEE
In today’s ‘survival of the fittest’
landscape, here are four ways to not
just survive but thrive with regards to
protecting the endpoint:
More tools do not make for a better
defence: Scrambling to adapt to the
evolving landscape, many security
teams have resorted to bolting on the
latest ‘best-of-breed’ point solutions. It
is more important to look at your overall
ecosystem and how these different
defences work together, rather than in
isolation. This is because point solutions
have limited visibility and see only what
they can see. As a consequence, the
burden of connecting the dots falls on
the customer.
This includes signature-based defence
(which eliminates 50% of the attack
noise – allowing algorithmic approaches
to run more aggressively with less
false alarms), plus exploit protection,
reputations, Machine Learning, ongoing
behavioral analytics and roll-back
remediation to reverse the effects of
ransomware and other threats.
All devices are not created equal:
Today, ‘endpoint’ has taken on a
whole new meaning. The term now
It’s really about
implementing a
holistic device
security strategy
that connects and
coordinates an array
of defences.
It’s important to harness the defences
built into modern devices while
extending their overall posture with
advanced capabilities.
Some endpoints, like IoT devices, lack
built-in protection and will need a full-
stack defence. Ultimately, the goal is
to not duplicate anything and not leave
anything exposed.
All you need is a single management
console: If, as a customer, you have
been deploying bolted-on endpoint
security technologies or several new,
next-generation solutions, you may
be seeing that each solution typically
comes with its own management
console. Learning and juggling multiple
consoles can overtax your already
stretched security team.
It makes them less effective, as they
are unable to see your entire
environment and the security posture
of all your devices in one place.
But it doesn’t have to be this way.
Practitioners can more quickly glean
the insights they need to act, when they
can view all the policies, alerts and raw
data from a centralised, single-pane-of-
glass console. u
It’s not about any one type of
countermeasure: As a never-ending
array of ‘next-generation’ solutions
started to emerge and flood the
marketplace, customers have been
told more than once that anti-virus isn’t
enough and what they need to do is
switch to next-gen.
In reality, it’s not about achieving a
next-generation approach or finding the
best use for anti-virus. It’s really about
implementing a holistic device security
strategy that connects and coordinates
an array of defences.
www.intelligentciso.com
|
Issue 17
39