SIP CALCULATOR

Money Per month(₹)
500
Interest Rate(%)
1
Year(s)
1
1,20,000
Invested
1,20,000
Returns
1,20,000
Total

Created By: PATHAN MUKHTAR KHAN

The growing importance of network segmentation, for everyday business

via TechRadar - All the latest technology news http://bit.ly/2QVSB3d The sheer size of modern corporate networks makes it increasingly diff...


via TechRadar - All the latest technology news http://bit.ly/2QVSB3d

The sheer size of modern corporate networks makes it increasingly difficult for companies to manage the complexity that comes alongside it. As a result, cybercriminals are ideally positioned to take advantage of this increased attack surface, leaving businesses scrambling to safeguard their networks from targeted and automated attacks that penetrate the network by capitalising on overly permissive access policies and exposed vulnerabilities.

In addition, as organizations become more agile, the frequency of change requests adds a degree of difficulty that challenges an organization’s existing resources and ability to maintain security.   

Whilst network segmentation may not be a new approach, it is by no means outdated. However, the process of grouping interfaces into separate zones takes on a new meaning with the advent of cloud and microservices. Effective network segmentation, as well as its implementation and long-term maintenance, is a major challenge for many companies – particularly in light of today’s complex networks and rapid adoption of the latest technologies.  

So, how can companies guarantee the effective implementation of network segmentation practices, while considering the intricacy of a corporate network?  

Start with the essentials

All companies should start by asking the key question, “What do I need from my network, and how should I divide it for manageability?” To begin with, most segmentation strategies isolate access to individual departments and further to within their own subsection or unit, which is entirely logical and therefore a necessary step towards ensuring that sensitive data does not find its way into the wrong hands.  

After dividing all the corporate networks into individual segments, often called “zones”, IT managers will need to ensure the provisioning of minimal required access between those zones or applications. Above all, highly sensitive areas should be proactively monitored to identify if unnecessary access can be removed.  

Continuation: the key for progress

The commonly-coined phrase “security is a journey, not a destination” certainly applies here. Network segmentation is not a one-time project, but an ongoing process that requires continuous maintenance. Networks are constantly in need of essential updating, whether this is driven by new business requirements or new devices being added to or removed from the network. An ongoing stepwise approach is best. At each of these steps, you can review, revise, and continue the momentum towards optimal segmentation:

  • Monitor network traffic within each segment to gauge normal levels of activity.
  • Reduce access to particular segments via firewalls to minimise exogenous threats and reduce the spread of successful attacks.
  • Separate data assets by regulatory mandates, providing more visibility into what the protected assets contain, and what measures need to be taken to reduce risk.
  • Continuously monitor for violations and threats to the network so changes can be made in real-time and bake risk analysis into the change management process.
  • Conduct regular internal audits to ensure prior changes in firewall policy haven’t introduced risk. 

Microsegmentation: stay one step ahead

Depending on the maturity and the complexity of a company, as well as its business requirements, microsegmentation can manage network access through a more dynamic and application-specific approach.  

When using microsegmentation, each individual segment is broken down even further – as far down as the application and the user levels. In each of these cases, access to data is only granted to a pre-defined security group of users that are carefully managed by the security team. The group can be easily modified to reflect changes in personnel, and access is provided between the specific security groups and the specific applications. Rather than treating networks as a broad collection of users, microsegmentation allows you to employ security in a more detailed way from the start.   

Microsegmentation can be used with physical networks, software-defined networks, and public cloud to manage advanced infrastructures by implementing access controls at the start.  

Maintaining this desired network segmentation is where the difficulty lies, given the complex nature of security policies, alongside the fact that these constant change requests are now seen as the norm within most companies.  

Regardless of where your organization stands on the network segmentation journey, comprehensive solutions that address the hybrid cloud and heterogeneous networks are required, thereby enabling IT security teams to effectively maintain a segmentation policy for their organisation.

An automated policy-based approach for segmentation 

Although achieving and maintaining effective network segmentation is a difficult journey, the security of your organization often depends on it. To do so, the best comprehensive solutions leverage policy-based automation to achieve and manage the most complex segmentation strategies. Automation is necessary to balance security and agility while ensuring manageability to maintain segmentation over the network of today – and the infrastructure of tomorrow. However, automation is only successfully utilized through leveraging a central policy to drive all access control changes between segments and ensure access violations are identified between network zones.  

Comprehensive network segmentation is as important as ever, particularly to contain potential attacks. The emergence of increased access control management, like microsegmentation, ensures security despite the increased complexity of the corporate network. Managing network segmentation through policy-based automation verifies effective access controls are applied to contain successful attacks and restrict the access of a disgruntled employee or hackers. Thus, automated policy-based solutions are a critical piece to ensure that your network defences are effectively designed, deployed, and managed now and throughout your digital transformation.   

Andrew Lintell, Regional Vice President at Tufin 

COMMENTS

Name

1988 Atlantic hurricane season,1,2017–18 Bergen County eruv controversy,1,All things,1,Amazon,89,Amazon.com: Best Sellers,14,Amazon.com: Best Sellers in Beauty & Personal Care,14,Amazon.com: Best Sellers in Clothing,61,Analisi Fondamentale,15,Analisi tecnica,40,Andrea Doria-class battleship,1,apple,51,Apple Newsroom,51,article of the day,198,Automated analytical tool for your forex trading account,2939,Banded stilt,1,Battle of Verrières Ridge,1,bbc news,5128,BBC News - World,5128,beauty,14,Beta-Hydroxy beta-methylbutyric acid,1,bitcoin,1,Britomart Redeems Faire Amoret,1,Buckton Castle,1,BUISNESS,2646,business,653,C. R. M. F. Cruttwell,1,Calendar Events,418,car insurance,1,Cloud (video game),1,Cooperative pulling paradigm,1,DailyFX - Feeds all,422,DailyFX - Forex Market News,205,DailyFX - Market News,3371,digital marketing,2,Dilophosaurus,1,Discovery Education,197,Education,408,education Learning In Wonderland,25,Education Week: English Language Learners,18,Emily Davison,1,Equestrian statue of Edward Horner,1,ESPN,48,Euryoryzomys emmonsae,1,Fantasy Book,1,fashion,30,Ford Piquette Avenue Plant,1,forex,2,Forex Calendar,3357,Forex Market,1858,Forex news,34,FOX NEWS,246,Fundamental Analysis,15,FX Analyst Articles,2140,Gadgets360 RSS Feeds : RSS Feed - NDTV Gadgets360.com,4411,Grand Duchess Anastasia Nikolaevna of Russia,1,Happy Chandler,1,Harry R. Truman,1,Health,70,Hilary of Chichester,1,Hogwarts Express (Universal Orlando Resort),1,Hurricane Daniel (2006),1,Ice drilling,1,IFTTT,509,internet marketing,1,Interstate 80 in Iowa,1,King Island emu,1,latest news,7786,Law,1,law.,1,M-35 (Michigan highway),1,market,623,Megalodon,1,Meteorological history of Hurricane Gordon,1,Moneycontrol Technology News,491,Monroe Doctrine Centennial half dollar,1,Monroe Edwards,1,More Hall Annex,1,Nat Geo Education Blog,67,National Geographic Education Blog,100,Nelson Mandela,1,Neville Chamberlain,1,news,8432,Nigel Williams (conservator),1,Nike-X,1,Norma (constellation),1,Norodom Ranariddh,1,Notizie Forex,22,Notizie Valute,12,NYT,1169,Ontario Highway 61,1,Percy Grainger,1,Peter Jeffrey (RAAF officer),1,Pioneer Helmet,1,Ramesses VI,1,reviews TechRadar - Technology Reviews,2,Russulaceae,1,Science-Fiction Plus,1,SEO,1,Shoes & Jewelry,61,Shorwell helmet,1,Simone Russell,1,Small-toothed sportive lemur,1,Snoring rail,1,Social forex community,2939,Social media marketing,1,Somerset Levels,1,South Carolina-class battleship,1,SPORT,61,Stefan Lochner,1,stock,1,Suillus spraguei,1,Teach123,6,tech,3833,tech reviews,3456,TECH TechRadar - All the latest technology news,23,Technical analysis,40,Technical Analysis DailyFX - pages/rss.rss-list.technical-analysis,526,Technical Analysis DailyFX - Technical Analysis,89,technology,198,techology,379,TechRadar - All the latest technology news,6005,TechRadar - Technology Reviews,1085,the new york times,2658,The Portage to San Cristobal of A.H.,1,Trade,8,video,1,vr,1,Wally Hammond,1,Waterloo Medal (Pistrucci),1,weight loss,2,Westminster Assembly,1,wikipedia,198,X-10 Graphite Reactor,1,
ltr
item
TECHNICAL MUKHTAR: The growing importance of network segmentation, for everyday business
The growing importance of network segmentation, for everyday business
http://cdn.mos.cms.futurecdn.net/xEpQMeDSc3ZZSpTUd8CyLD.jpg
TECHNICAL MUKHTAR
https://technicalmukhtar.blogspot.com/2019/01/the-growing-importance-of-network.html
https://technicalmukhtar.blogspot.com/
https://technicalmukhtar.blogspot.com/
https://technicalmukhtar.blogspot.com/2019/01/the-growing-importance-of-network.html
true
709309995759877420
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy