Welcome!

News Feed Item

Network Security Manageability Tools: The Three Phases of Evolution

NEW YORK, Jan. 15, 2014 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Network Security Manageability Tools: The Three Phases of Evolution
http://www.reportlinker.com/p01941687/Network-Security-Manageability-Tools-The-Three-Phases-of-Evolution.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

Introduction

The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. Described in this study are the factors contributing to security management complexity; why enhanced manageability tools are the right remedy; and the phases through which these management tools will evolve.

A Richer World of Internet-Based Communication

How people interact and communicate via the Internet has changed with social media and other forms of communication, computing, and collaboration. Gone are the days in which a Web browser was used as a one-way tool to obtain information from the Internet; and interactive information was only exchanged via e-mail. Web browsers are now the bi-directional interface for a number of communication channels, including Facebook, LinkedIn, Twitter, Skype, and many others. The growth of Internet communication channels is exacerbated by the proliferation of mobile computing platforms and the corresponding availability of mobile and Web applications, providing a wealth of personal and corporate identifiable information to cyber miscreants.

Increasingly Worrisome Vulnerabilities, Threats, and Attacks

This new world of rich and dynamic Internet-based communication channels has brought with it a host of new vulnerabilities. While each vulnerability is a cause for concern, that concern is greater when the intent of malicious actors is financial gain. Furthermore, with profit as a motive, the actors have become more sophisticated (multi-variable exploits) and stealthier than were the earlier perpetrators of malicious activity, which were driven by the quest for notoriety.
No surprise that information security professionals are feeling the impact.

Increasing Complexity Created by a Multitude of Security Technologies

The increasing sophistication and breadth of threats has driven an evolution in the type and number of security technologies. Among those security technologies are:
- Anti-virus software is used to prevent, detect, and remove malware from client devices such as PCs, tablets, and smartphones.
- Web content security protects users and their organizations from Web-based malware, corporate-unsanctioned content, and malicious URLs.
- E-mail content security filters and strips e-mail of phishing schemes, spam, malicious links, inappropriate images or content, and malware.
- Intrusion prevention systems (IPS) monitor network traffic for malicious activity and provide security professionals with mitigation tools.
- Data loss prevention (DLP) detects and lessens instances of nefarious and unintended outward flow of sensitive data
- Distributed denial of service (DDoS) identification and mitigation technologies provide protection against resource-robbing and Web site-disrupting attacks.
- Encryption encodes data or information in such a way that third parties cannot read it, but authorized parties can.
- Network Access Control (NAC) manages device access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.
- Stateful inspection and next generation, context-aware firewalls create a barrier between trusted, secure internal network and the Internet.

Network and Information Security Professionals Need Help

The security industry has been commendable in creating new point solutions to address the evolving threat landscape. However, an unforeseen consequence has developed. As the complexity of the threats being combatted increased, the complexity of the security technologies used to combat the threats also increased. Additionally, as the number of security technologies grew, so did management complexity in terms of controls and data. This problem of complexity is further exacerbated by an expanding universe that security professionals are tasked to secure as more organizations supplement their IT resources with cloud services, and employees increasingly access corporate resources through their personal mobile devices—a trend often referred to as bring your own device (BYOD).
The increasing complexity of network and information security is being addressed by security teams that are already overtaxed. In a recent survey conducted by Frost & Sullivan of over information security professionals, percent report that their organizations have too few information security workers.

Introduction
A Richer World of Internet-Based Communication
Increasingly Worrisome Vulnerabilities, Threats, and Attacks
Increasing Complexity Created by a Multitude of Security Technologies
Network and Information Security Professionals Need Help
Clear Message: Richer Tools to Manage across Security Technologies
Network Security Manageability Tool Evolution
Visibility
Implementation
Automation
Progressing toward Automation
The Need for Policies

The Need for Standards
Improved Manageability Tools in Action
Visibility Illustration: WatchGuard Dimension
Implementation Illustration: Websense TRITON
Automation Illustration: ForeScout ControlFabric
The Last Word

List of Figures

Figure 1: Top and High Rated Threats and Vulnerability Concerns Voiced by Information Security Processionals, Late 2012
Figure 2: Security Professional Staffing
Figure 3: Security Professional Staffing Rationale
Figure 4: Technologies that Significantly Improve System and Network Security
Figure 5: Network Security Manageability Tool Evolution
Figure 6: Illustration of ForeScout ControlFabric Communication Architecture

To order this report: Network Security Manageability Tools: The Three Phases of Evolution
http://www.reportlinker.com/p01941687/Network-Security-Manageability-Tools-The-Three-Phases-of-Evolution.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Security_Systems

__________________________
Contact Clare: [email protected]
US: (339)-368-6001
Intl: +1 339-368-6001

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
SYS-CON Events announced today that Hitrons Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Hitrons Solutions Inc. is distributor in the North American market for unique products and services of small and medium-size businesses, including cloud services and solutions, SEO marketing platforms, and mobile applications.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Pulzze Systems was happy to participate in such a premier event and thankful to be receiving the winning investment and global network support from G-Startup Worldwide. It is an exciting time for Pulzze to showcase the effectiveness of innovative technologies and enable them to make the world smarter and better. The reputable contest is held to identify promising startups around the globe that are assured to change the world through their innovative products and disruptive technologies. There w...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...