Pervasive protection is the new security paradigm

Pervasive protection is the new security paradigm

Date: Jul 28, 2014

In this, the second part of a three-part video series, Henry Svendblad, principal analyst at Nemertes Research Group Inc., explores the new IT landscape and recommends a new security paradigm. He discusses how virtualization, cloud services and mobility are changing the way IT services are delivered to the business and what enterprises must do to protect their data assets. Despite all the benefits of these new developments, there is a need to adopt a new approach to securing the enterprise.

Svendblad defines pervasive protection as a suite of enterprise security technologies and operational capabilities that provide end-to-end security, with identity-based security at the center of the paradigm. It also includes the idea of assessing the risk of new technologies and services or delivery mechanisms, with the goal of achieving security that is centrally managed -- that is, the establishment of a centralized management team that handles all controls, monitoring, analysis and mitigating problems in an enterprise network.

Check out parts one and three

Read more about the changing IT security landscape

Learn how to implement pervasive protection techniques at your company

Svendblad says it's important to have centralized policies for all applications whether they are in the cloud or on the premises. Defining the ability of users to access and change information regardless of the device or network used is critical to a centrally managed network. Without a single set of security policies governing all users, devices, locations, applications and data, you will have what Svendblad calls "unbalanced protection."

How do you find balance? Svendblad says it's a combination of policy management, forensics, security information management, intrusion protection and detection and risk management.

Svendblad finds that most IT pros understand the importance of this policy, but not a lot have actually implemented it. Watch the video to find out why most enterprises do not have a centrally managed security system and to learn why it's important that they do.

More on Network Security Best Practices and Products

  • canderson

    Regulatory pressure accompanies changing IT landscape

    VIDEO - The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
  • canderson

    Implementing a new security management plan

    VIDEO - To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
  • canderson

    How to find the next-gen firewall your network security needs

    VIDEO - Odds are your network needs an NGFW, but first you need to know what it does, where it fits and what questions to ask vendors.
  • User activity monitoring is just as critical as asset monitoring

    News - User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.

    ( Nov 26, 2014 )

  • firewall

    Definition - A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.
  • Information security services under siege

    Opinion - Security professionals are disillusioned and desperate for some progress in the uphill battle against attackers. Is the security industry up for the task?
  • Fortinet, SonicWall release new enterprise firewalls

    News - New enterprise firewalls from Fortinet and SonicWall offer carrier-class speeds and feeds at a nice price.

    ( Oct 30, 2014 )

  • IBM not in financial crisis

    News - SN blogs: This week, one analyst discusses the importance of incident detection and response; another speculates on the benefits of SDN and DevOps.

    ( Oct 24, 2014 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: