Intelligent CISO Issue 17 | Page 39

FEATURE Knowing whether you’re the type of company that would be targeted for a specific reason is valuable and being able to share intelligence with similar companies protects you all. encompasses traditional servers, PCs, laptops mobile devices (both BYOD and corporate issued), cloud environments and IoT devices like printers, scanners, point-of-sale handhelds and even wearables. Adversaries don’t just target one type of device – they launch organised campaigns across your entire environment to establish a foothold and then move laterally. If for example, another company in your field was hit for specific intellectual property you could greatly increase your resiliency to the same problem by knowing the details of how they were compromised. Security is in everyone’s best interest and the more open and honest we are within our industries, the more collective immunity we’ll have from threats. SCOTT SCOTT MANSON, MANSON, MANAGING MANAGING DIRECTOR, DIRECTOR, MIDDLE MIDDLE EAST EAST AND AND TURKEY TURKEY AT AT MCAFEE MCAFEE In today’s ‘survival of the fittest’ landscape, here are four ways to not just survive but thrive with regards to protecting the endpoint: More tools do not make for a better defence: Scrambling to adapt to the evolving landscape, many security teams have resorted to bolting on the latest ‘best-of-breed’ point solutions. It is more important to look at your overall ecosystem and how these different defences work together, rather than in isolation. This is because point solutions have limited visibility and see only what they can see. As a consequence, the burden of connecting the dots falls on the customer. This includes signature-based defence (which eliminates 50% of the attack noise – allowing algorithmic approaches to run more aggressively with less false alarms), plus exploit protection, reputations, Machine Learning, ongoing behavioral analytics and roll-back remediation to reverse the effects of ransomware and other threats. All devices are not created equal: Today, ‘endpoint’ has taken on a whole new meaning. The term now It’s really about implementing a holistic device security strategy that connects and coordinates an array of defences. It’s important to harness the defences built into modern devices while extending their overall posture with advanced capabilities. Some endpoints, like IoT devices, lack built-in protection and will need a full- stack defence. Ultimately, the goal is to not duplicate anything and not leave anything exposed. All you need is a single management console: If, as a customer, you have been deploying bolted-on endpoint security technologies or several new, next-generation solutions, you may be seeing that each solution typically comes with its own management console. Learning and juggling multiple consoles can overtax your already stretched security team. It makes them less effective, as they are unable to see your entire environment and the security posture of all your devices in one place. But it doesn’t have to be this way. Practitioners can more quickly glean the insights they need to act, when they can view all the policies, alerts and raw data from a centralised, single-pane-of- glass console. u It’s not about any one type of countermeasure: As a never-ending array of ‘next-generation’ solutions started to emerge and flood the marketplace, customers have been told more than once that anti-virus isn’t enough and what they need to do is switch to next-gen. In reality, it’s not about achieving a next-generation approach or finding the best use for anti-virus. It’s really about implementing a holistic device security strategy that connects and coordinates an array of defences. www.intelligentciso.com | Issue 17 39