Executive Viewpoint 2014 Prediction: DB Networks
By Steve Hunt
December 10, 2013
More and more organizations are coming to the realization that cyber criminals are able to bypass their signature-based perimeter defenses with impunity. Cyber criminals use automated tools to make short work of the task. As organizations continue to witness these escalating threats against their perimeter network defenses, there will be increased emphasis on securing critical IT assets – especially databases – within the core, in 2014.
Hardening the core networks ensures the greatest visibility into the threats that may affect critical IT assets. This also significantly improves the accuracy of detecting attacks. Furthermore, as datacenter operations become increasingly virtualized, critical information assets may spread across numerous networks. At that point it becomes extremely important to monitor both the physical and virtual networks. Specifically I believe we’ll see organizations’ network security strategies begin to reach deeper into the network to implement continuous monitoring in the core networks. The mindsets of the network security personnel will begin to change from a heavy focus on the network perimeter to a comprehensive approach of network security and intrusion detection on all networks, including core networks. Focusing on the core in 2014 will bring about a number of benefits.
Read more at http://www.virtual-strategy.com/2013/12/10/executive-viewpoint-2014-prediction-db-networks
By Steve Hunt
December 10, 2013
More and more organizations are coming to the realization that cyber criminals are able to bypass their signature-based perimeter defenses with impunity. Cyber criminals use automated tools to make short work of the task. As organizations continue to witness these escalating threats against their perimeter network defenses, there will be increased emphasis on securing critical IT assets – especially databases – within the core, in 2014.
Hardening the core networks ensures the greatest visibility into the threats that may affect critical IT assets. This also significantly improves the accuracy of detecting attacks. Furthermore, as datacenter operations become increasingly virtualized, critical information assets may spread across numerous networks. At that point it becomes extremely important to monitor both the physical and virtual networks. Specifically I believe we’ll see organizations’ network security strategies begin to reach deeper into the network to implement continuous monitoring in the core networks. The mindsets of the network security personnel will begin to change from a heavy focus on the network perimeter to a comprehensive approach of network security and intrusion detection on all networks, including core networks. Focusing on the core in 2014 will bring about a number of benefits.
Read more at http://www.virtual-strategy.com/2013/12/10/executive-viewpoint-2014-prediction-db-networks