Welcome!

News Feed Item

Network Security Manageability Tools: The Three Phases of Evolution

NEW YORK, Jan. 15, 2014 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Network Security Manageability Tools: The Three Phases of Evolution
http://www.reportlinker.com/p01941687/Network-Security-Manageability-Tools-The-Three-Phases-of-Evolution.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

Introduction

The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. Described in this study are the factors contributing to security management complexity; why enhanced manageability tools are the right remedy; and the phases through which these management tools will evolve.

A Richer World of Internet-Based Communication

How people interact and communicate via the Internet has changed with social media and other forms of communication, computing, and collaboration. Gone are the days in which a Web browser was used as a one-way tool to obtain information from the Internet; and interactive information was only exchanged via e-mail. Web browsers are now the bi-directional interface for a number of communication channels, including Facebook, LinkedIn, Twitter, Skype, and many others. The growth of Internet communication channels is exacerbated by the proliferation of mobile computing platforms and the corresponding availability of mobile and Web applications, providing a wealth of personal and corporate identifiable information to cyber miscreants.

Increasingly Worrisome Vulnerabilities, Threats, and Attacks

This new world of rich and dynamic Internet-based communication channels has brought with it a host of new vulnerabilities. While each vulnerability is a cause for concern, that concern is greater when the intent of malicious actors is financial gain. Furthermore, with profit as a motive, the actors have become more sophisticated (multi-variable exploits) and stealthier than were the earlier perpetrators of malicious activity, which were driven by the quest for notoriety.
No surprise that information security professionals are feeling the impact.

Increasing Complexity Created by a Multitude of Security Technologies

The increasing sophistication and breadth of threats has driven an evolution in the type and number of security technologies. Among those security technologies are:
- Anti-virus software is used to prevent, detect, and remove malware from client devices such as PCs, tablets, and smartphones.
- Web content security protects users and their organizations from Web-based malware, corporate-unsanctioned content, and malicious URLs.
- E-mail content security filters and strips e-mail of phishing schemes, spam, malicious links, inappropriate images or content, and malware.
- Intrusion prevention systems (IPS) monitor network traffic for malicious activity and provide security professionals with mitigation tools.
- Data loss prevention (DLP) detects and lessens instances of nefarious and unintended outward flow of sensitive data
- Distributed denial of service (DDoS) identification and mitigation technologies provide protection against resource-robbing and Web site-disrupting attacks.
- Encryption encodes data or information in such a way that third parties cannot read it, but authorized parties can.
- Network Access Control (NAC) manages device access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.
- Stateful inspection and next generation, context-aware firewalls create a barrier between trusted, secure internal network and the Internet.

Network and Information Security Professionals Need Help

The security industry has been commendable in creating new point solutions to address the evolving threat landscape. However, an unforeseen consequence has developed. As the complexity of the threats being combatted increased, the complexity of the security technologies used to combat the threats also increased. Additionally, as the number of security technologies grew, so did management complexity in terms of controls and data. This problem of complexity is further exacerbated by an expanding universe that security professionals are tasked to secure as more organizations supplement their IT resources with cloud services, and employees increasingly access corporate resources through their personal mobile devices—a trend often referred to as bring your own device (BYOD).
The increasing complexity of network and information security is being addressed by security teams that are already overtaxed. In a recent survey conducted by Frost & Sullivan of over information security professionals, percent report that their organizations have too few information security workers.

Introduction
A Richer World of Internet-Based Communication
Increasingly Worrisome Vulnerabilities, Threats, and Attacks
Increasing Complexity Created by a Multitude of Security Technologies
Network and Information Security Professionals Need Help
Clear Message: Richer Tools to Manage across Security Technologies
Network Security Manageability Tool Evolution
Visibility
Implementation
Automation
Progressing toward Automation
The Need for Policies

The Need for Standards
Improved Manageability Tools in Action
Visibility Illustration: WatchGuard Dimension
Implementation Illustration: Websense TRITON
Automation Illustration: ForeScout ControlFabric
The Last Word

List of Figures

Figure 1: Top and High Rated Threats and Vulnerability Concerns Voiced by Information Security Processionals, Late 2012
Figure 2: Security Professional Staffing
Figure 3: Security Professional Staffing Rationale
Figure 4: Technologies that Significantly Improve System and Network Security
Figure 5: Network Security Manageability Tool Evolution
Figure 6: Illustration of ForeScout ControlFabric Communication Architecture

To order this report: Network Security Manageability Tools: The Three Phases of Evolution
http://www.reportlinker.com/p01941687/Network-Security-Manageability-Tools-The-Three-Phases-of-Evolution.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

__________________________
Contact Clare: [email protected]
US: (339)-368-6001
Intl: +1 339-368-6001

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, will discuss using predictive analytics to ...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Father business cycles and digital consumers are forcing enterprises to respond faster to customer needs and competitive demands. Successful integration of DevOps and Agile development will be key for business success in today’s digital economy. In his session at DevOps Summit, Pradeep Prabhu, Co-Founder & CEO of Cloudmunch, covered the critical practices that enterprises should consider to seamlessly integrate Agile and DevOps processes, barriers to implementing this in the enterprise, and pr...
Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, showed how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He used a Raspberry Pi to connect sensors...
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, explored the latest tools including Puppet, Chef, Docker, and CMPs needed to...
One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
Data-as-a-Service is the complete package for the transformation of raw data into meaningful data assets and the delivery of those data assets. In her session at 18th Cloud Expo, Lakshmi Randall, an industry expert, analyst and strategist, will address: What is DaaS (Data-as-a-Service)? Challenges addressed by DaaS Vendors that are enabling DaaS Architecture options for DaaS
DevOps is not just last year’s buzzword. Companies with DevOps practices are 2.5x more likely to exceed profitability, market share, and productivity goals. But how do you enable high performance? What can you do right now to start? Find out from DevOps experts including Gene Kim, co-author of "The Phoenix Project," and the Dynatrace Center of Excellence.
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Avere delivers a more modern architectural approach to storage that doesn’t require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbuilding of data centers ...
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...