Breaking Enterprise Silos and Improving Protection

News

HomeHome / News / Breaking Enterprise Silos and Improving Protection

Aug 01, 2023

Breaking Enterprise Silos and Improving Protection

When teams have a way to break down enterprise silos and see and understand what

When teams have a way to break down enterprise silos and see and understand what is happening, they can improve protection across their increasingly dispersed and diverse environment.

By

Flipboard

Reddit

Pinterest

Whatsapp

Whatsapp

Email

As networks become atomized, the need for specialization comes into play. Infrastructure is spread across legacy, on-premises, hybrid, multi-cloud, and edge environments. Organizations have security operations center (SOC), network, cloud operations, and in some cases operational technology (OT) teams all tasked with keeping the business up and running and secure. And each team consists of subject matter experts with specialized levels of knowledge and specific tools that they use.

When capabilities, nomenclature, constructs, and available data are unique to each type of environment, teams operate in silos. So, it's incredibly difficult to get a big picture view of what is happening across the organization to improve protection, maintain compliance, and optimize performance.

Finding a common language

What's needed are tools that empower each team to do their job, as well as enable collaboration between teams. And that gets increasingly hard to achieve as the network becomes diverse and dispersed. Different teams have their own tools which they know inside and out, but the crossover value with the other teams is limited.

The first step to breaking down barriers between teams is to find a language that these teams can speak and one tool they can all use without needing to know the uber details of the different environments in which each team operates and how they describe what is happening. Think of it as a common root language but with different dialects. Different teams can share information without having to translate back and forth, and have the capabilities they need to protect their specific environments.

Adding context for greater understanding

The next step is to be able to incorporate context using common key words we all understand. Functionally, the teams may use the tool very differently; SOC analysts may use the tool for threat hunting, and the network team may use it for network visualization and performance. However, one language enriched with organizational context can be the glue that brings both teams together.

Applying context labels to the same, standardized data creates corporate knowledge that they can share. Suddenly, "this IP address talked to that IP address", becomes "this IP phone talked to a specific container in the cloud" or "this laptop talked to this video surveillance system." Teams can search for and pull up the information they need using the same tool and the same language. They don't have to go through a lengthy and cumbersome process of figuring out what something means in their AWS cloud tools versus their Azure cloud tools versus their OT systems and their IT systems. The translation is done for them.

Getting to the same meaning faster

Now, everyone can visualize what they’ve got, what it is doing, and what's happening to it across environments. They can get to the same meaning much faster and move quickly to do what's required to protect the organization. For example:

From detecting threats to misconfigurations in new services, pathways, devices, and users — When teams have a way to break down enterprise silos and see and understand what is happening, they can improve protection across their increasingly dispersed and diverse environment.

Matt Wilson is the Vice President of Product Management at Netography. Over his 25+ year career, Matt has held senior technology leadership positions across numerous industries including Neustar, Verisign, and Prolexic Technologies. With a rich background in innovation and go-to-market strategies, Matt has been a critical leader in helping many companies conceptualize solutions from the customer lens and drive them to market with significant impact.

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek's Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Securityweek's CISO Forum will address issues and challenges that are top of mind for today's security leaders and what the future looks like as chief defenders of the enterprise.

If we should face a Dead-End AI future, the cybersecurity industry will continue to rely heavily on traditional approaches, especially human-driven ones. It won't quite be business as usual though.(Oliver Rochford)

Regardless of the use case your security organization is focused on, you’ll likely waste time and resources and make poor decisions if you don't start with understanding your threat landscape.(Marc Solomon)

Industry standard frameworks and guidelines often lead organizations to believe that deploying more security solutions will result in greater protection against threats.(Torsten George)

With proactive steps to move toward Zero Trust, technology leaders can leverage an old, yet new, idea that must become the security norm.(Marie Hattar)

A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish(Derek Manky)

Flipboard

Reddit

Pinterest

Whatsapp

Whatsapp

Email

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn't seek to protect everything, but concentrates on areas...

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That's why it's so critical to break the...

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.

Finding a common language Adding context for greater understanding Getting to the same meaning faster