安全性一直是一个棘手的话题,但在IoT时代,保护您的数据和资产的挑战比过去任何时候都更加巨大。

数字化生态合作体系比过去更加复杂,保护该体系的安全工作也变得更加复杂。过去保护周边是重点,而现在形势已大不相同,目前,网络是分散和模块化的。移动性、云和最近新兴的物联网使网络远远超出了企业数据中心的范围。 移动和IoT设备引入大量的接入点,每个接入点又引入了大量不安全的数据流。

因此,IT人员和安全团队面临前所未有的压力。攻击和破坏来自各个方面,为日益增长的资产带来了损害。然而,如果使用正确的工具和策略,您可以保护您的IT基础设施,及时检测(和解决)问题,避免这些问题演变为灾难,减少停机时间并提高性能。

根据Ponemon Institute的《2016年网络安全趋势报告,2016年全球用于检测、响应和减少安全漏洞的平均成本为每单个设备7.7美元。对于美国企业而言,平均费用是上述数字的近两倍,即15美元。

2016 Cybersecurity Trend Report

Ponemon Institute

Reasons you should consider new security strategies
  • IoT 即将到来,其商业价值取决于安全的网络基础设施来支持系统与设备之间的恒定链路。 
  • 业务流程自动化有望带来巨大的优势,前提是可以信任设备、应用以及在这两者之间移动的数据。
  • 移动性 BYOD 和无适当保护的网络访问可能会给您的IT基础设施带来威胁。
  • IT简化:有效的安全策略可降低复杂性

安全 漏洞的 成本非常高昂,通常不仅仅限于金钱方面

没有一款单点解决方案能够防止当前令人眼花缭乱的威胁矩阵;相反,必须将安全性视为一个由协调一致、协同工作的工具和策略组成的多方面生态合作体系,不仅能够保护和监测入口点,还要对可疑的流量或行为做出快速、果断和有效的反应。

Four recommendations for a robust security strategy
  1. Implement detailed security policies. Having a strong security policy engine in place provides the fine-toothed ability to define rules that can limit access based on time of day, the device being used, and a long list of other factors. Digital infrastructures must validate data, behavior and destinations, and respond automatically to threats.
  2. Get IoT-ready, because enterprise IoT adoption is a matter of when, not if. Superior IoT security means optimizing your infrastructure and beefing up granular control, including the ability to establish separate containers on your existing network.
  3. Identify code vulnerabilities. As the sophistication of network devices has grown, they have become more attractive targets for cyber attackers, who can exploit the increasing volumes of code contained in every point of access. Switch-level solutions such as CodeGuardian can minimize the potential impact of a breach by identifying — and scrambling — code vulnerabilities, while a technology like deep packet inspection can block device-generated traffic it deems to be malicious.
  4. Set up strong access controls: as one of the best layers of network defense, they've never been more necessary. It's critical to authorize users or devices before connecting them to network assets, quarantine suspicious activity and run health checks on devices for additional protection.
相关资料
相关产品
了解更多您感兴趣的内容