Menu
What does the threat surface mean for cyber security costs?

What does the threat surface mean for cyber security costs?

"Organisations need to reduce this attack surface to make their existing security infrastructure more effective."

The rapidly-increasing number of connected devices, such as smartphones and tablets, have made the business world more flexible, mobile, and innovative.

But there are drawbacks. For each connected device that communicates with internal business networks, the potential attack surface for cyber criminals grows.

Organisations need to reduce this attack surface to make their existing security infrastructure more effective.

Today’s ever-expanding attack surface generally demands multiple layers of security systems, such as firewalls and intrusion prevention platforms, and increasing security information.

“The network bandwidth, security resources, processing power, and oversight needed to keep multiple security solutions operating efficiently can be a substantial drain on organisations, especially when those resources are being taken from activities that add value to the business,” says Stephen Urquhart, general manager A/NZ, Ixia.

“Even when organisations are directing adequate resources to multiple layers of security, protection from unknown threats is not guaranteed.

“Most companies now have many endpoints integrated with their internal systems via mobile devices and other external equipment. These present new and expanded vulnerabilities that attackers can exploit.”

Traditional cyber security platforms often leave organisations spending a lot of time dealing with false-positive security alerts.

According to research by the Ponemon Institute, companies spend approximately 21,000 hours per year reviewing and managing these reports.

For Urquhart, this means that determining which alerts are critical is like trying to find a needle in a haystack, and could lead to overlooked intrusion attempts.

Urquhart says one of the ways businesses can avoid the drain on resources required to maintain and manage multiple layers of cyber security infrastructure is to simply reduce their potential attack surface.

“The network attack surface is the sum of every single point of access to an enterprise network,” Urquhart adds.

“Most enterprise security inspects all the traffic already in the network, whether it’s meant to be there or not.

“Putting a barrier in place to make sure that traffic doesn’t get in to begin with dramatically cuts down on the amount of work these existing enterprise security platforms need to do, making them more efficient.”


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags Ixiasecuritycyber

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments