Technology Resources

Content Security-Protect Your Network with Five Must-Haves

Issue link:

Contents of this Issue


Page 0 of 4

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5 White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the "discovery" of threats more relevant than "defense" as a modern approach to content security. Enterprises must focus on content inspection, behavior-anomaly detection, and advanced forensics to gain visibility into threats that are already present. They must understand where the data is, how it is being accessed and shared, and by which users in what places using what types of devices. The content security solutions they rely on must therefore have the capability to: 1. Provide protection across the attack continuum: before, during, and after an attack 2. Stay ahead of the evolving threat landscape 3. Protect sensitive data—and prevent it from leaving the organization 4. Reduce risk through strong controls 5. Address new attack vectors as they emerge Challenges Content security has never been more challenging for organizations in an era where the theft or compromise of data is often the primary incentive for an attack. According to the Cisco 2014 Annual Security Report, "Data is the prize most adversaries want to reach through their campaigns because it is essentially currency…whether it's a major corporation's intellectual property or an individual's healthcare data—it is desirable and, therefore, at risk." 1 Adding to the challenge are changing business models—from cloud computing and virtualization to mobile working and the bring-your-own-device (BYOD) trend. These models are extending the network and making it more porous, moving more and more data outside enterprise control and creating more vectors for attack. Meanwhile, nonintegrated point solutions and multiple management platforms intended to enhance security only create more gaps that adversaries can use to launch targeted malware that can modify its behavior and evade detection. Hacking is now industrialized, and targeted campaigns more sophisticated. Email virus attacks and spear-phishing schemes are on the rise, delivering malware designed to infiltrate data centers where high-value data resides. The advanced malware that malicious actors deploy can easily evade point-in-time security solutions and spread quickly through a network. Clearly, hackers are benefiting from the expanded attack surface: Cisco Security Intelligence Operations (SIO) researchers report that malicious traffic is visible on 100 percent of corporate networks, which means all organizations should assume they've been hacked. 2 1 Cisco 2014 Annual Security Report. 2 Ibid.

Articles in this issue

Links on this page

view archives of Technology Resources - Content Security-Protect Your Network with Five Must-Haves