Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Ensuring network perimeter security in a perimeterless age

The increasingly porous enterprise perimeter, challenged by BYOD, private and public Wi-Fi and other access options, makes traditional network perimeter security obsolete.

FROM THE SECURITY SCHOOL:

Network perimeter security in a perimeterless world

SECURITY SCHOOL SECTIONS

  1. Learning Links
+ Show More

Cybersecurity borrows many concepts and ideas from the military, intelligence, medical and physical security worlds....

Many times these concepts can help, but sometimes they mislead. The concept of the enterprise perimeter is a case in point.

Originally, security architectures were predicated on the notion that network perimeter security could be established on the "inside" (private circuits, servers, routers and devices residing on a user's premise that security professionals control) and protected against threats from the "outside" (public networks and off-premises devices). The demarcation between inside and outside is, of course, the enterprise perimeter. Specifically, network perimeter security was enforced by the line of firewalls and other protective devices that physically insulated a company's presumably secure infrastructure from potentially insecure public devices and services.

But these days no such separation exists between inside and outside an enterprise perimeter. Users are increasingly located off-premises, connecting via the public Internet or mobile devices and services. Corporate data and applications often reside in the cloud. And, most of all, it's no longer appropriate to assume that those on the inside are protected by traditional network perimeter security: Insiders perpetuate many hacks on their own organizations, either wittingly or as unwitting mules carrying sophisticated malware.

What's needed is perimeterless protection: an architecture that protects users, applications and assets wherever they reside, without reference to an enterprise perimeter. This protection must hold against long-term, multifaceted attacks like advanced persistent threats (APT).

There are a number of key building blocks required in this architecture.

Produce effective network perimeter security

  1. Data loss prevention (DLP)
    DLP products and applications, the first of the key building blocks, are available as hardware appliances, software applications and cloud-based services. They monitor structured data (databases, spreadsheets) as well as unstructured data (email, Word documents, multimedia files) to ensure that only individuals with the appropriate access rights view or modify this information. Had Sony pictures  put an effective DLP system in place, the devastating hack could have been avoided. DLP product vendors include: Blue Coat Systems Inc., Cisco, Code Green Networks, GTB Technologies, McAfee, Sophos, Symantec, Trend Micro, Digital Guardian and Websense. Key functions to look for in DLP products include real-time performance, comprehensive support for a variety of file formats, protocols, languages (not all documents are in English!), ease of management and configuration, and effective integration with policies.
  2. Secure Web gateways
    Like DLP products, secure Web gateways (SWGs) are available as hardware appliances, software applications and cloud-based services. The difference between DLP and SWG is that while DLP offerings monitor a company's assets to protect against inappropriate viewing, modification or sharing, SWGs monitor traffic to protect against the introduction of malware. SWGs are available from such vendors as Barracuda, Blue Coat, Cisco, McAfee, iSheriff, Sophos, Symantec, Trend Micro, Websense and Zscaler. Key features to look for in these products include real-time performance, range of protocols supported (IPSec and SSL are table stakes), sandboxing, integration with social media and support for mobile devices.
  3. Security analytics products and frameworks
    Analytics tools are an outgrowth of the security information and event management (SIEM) product market. Like SIEM tools, security analytics products aim to uncover security events as they occur, ideally in real time. Unlike these tools, modern security analytics tools are often based on contemporary big data technologies, such as Hadoop. They typically integrate with a range of devices and products to provide ongoing analysis of an organization's security status. Vendors of security analytics products include Agiliance, Blue Coat, Damballa, FireEye, Guidance Software, HP Arcsight, IBM, Lastline, LogRhythm, McAfee and Splunk. Key features to consider with such products include real-time integration with online data sources (a critical way to stay up-to-date), real-time performance and alerting, and remediation capabilities.

The bottom line

The enterprise perimeter has vanished. And the emergence of a perimeterless world means that security professionals need to rethink their security architectures, removing the assumption of network perimeter security. This, in turn, means assessing new products and frameworks, and focusing attention on how to seamlessly integrate them.

Next Steps

See how strategies for wielding data loss prevention systems can help protect sensitive data

Learn how to evaluate and implement secure web gateways

Find out more about six key criteria for evaluating security analytics software

This was last published in October 2015

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Network perimeter security in a perimeterless world

SECURITY SCHOOL SECTIONS

  1. Learning Links

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How has the definition of your organizational network perimeter security changed in the past decade?
Cancel
I would add a fourth item to the list of key building blocks - education of the employees, both about the lack of a defined perimeter, how that affects everyone in the organization, and what they need to do to help secure the network.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close