Sie sind auf Seite 1von 19

Home

Home
A Computer Weekly buyer’s
Making unified
guide to threat management
threat management
a key security tool
How unified threat
management can be
a useful tool when
chosen correctly
according to
business needs

Layer your approach


to web security
Combining unified
threat management
with other security
systems is essential
to tackle threats

Choosing cloud-
based security
services
Cloud-based security
helps reduce costs for
firms with a growing
cloud footprint

Threat management has become a vital component in the cyber security strategy of many businesses. In this
19-page buyer’s guide, Computer Weekly looks at why threat management should be tailored to your company’s
needs, the strength in combining it with other security systems and how cloud-based security can reduce costs

ALEX/ADOBE
computerweekly.com buyer’s guide 1
BUYER’S GUIDE TO THREAT MANAGEMENT

Making unified
threat management a
key security tool
T he 2018 Cyber Security Breaches Survey from the
Department for Digital, Culture, Media and Sport
(DCMS) found that 43% of the 1,519 UK businesses
that participated admitted they had experienced a
cyber attack or security breach.
Fines for major data breaches may be among the main reasons
the industry is pushing unified threat management (UTM), says
Peter Wenham, a member of the BCS security community of
As data protection becomes critical to businesses, Warwick Ashford expertise. The General Data Protection Regulation (GDPR) has
looks at how unified threat management can be a useful tool, providing driven many chief information security officers (CISOs) to reas-
it is selected and deployed correctly according to business needs sess their security posture. The new data regulation, which came
into force in May 2018, means organisations face fines of up to
4% of global turnover. According to Wenham, UTM systems can
help reduce the threats that could lead to a breach.

Benefits of UTM
Emma Bickerstaffe, senior research analyst at the Information
Security Forum (ISF), says UTM systems were designed primar-
ily for small to medium-sized enterprises (SMEs), but suppli-
ers are increasingly promoting UTM as a viable and beneficial
option for large enterprises.
The advantage of implementing a UTM appliance is that there
is a single interface from which to both manage UTM appliance
functionality and to monitor network events in a consolidated
view. Other UTM appliance functions can include prioritising
events and the alerting of significant events via video screens, SMS
FEODORA/ADOBE

text messages and email, in addition to comprehensive reporting


capabilities. Some products also offer artificial intelligence (AI) to

HOME

computerweekly.com buyer’s guide 2


BUYER’S GUIDE
Home

Making unified
threat management
aid diagnosis of security-related events, while most offer tools to UTM tool that can be used to protect the organisation. “By inter-
a key security tool aid investigations, says Wenham. cepting web requests at the point of initiation and using pre-
How unified threat The centralised management control is often the clincher, with defined and frequently updated whitelists and blocklists of sites,
management can be
a useful tool when administrators gravitating to this with the intention of being an organisation can screen out and mitigate the threat posed by
chosen correctly able to deploy policies uniformly by using a single console, says a significant proportion of phishing attacks, malware-infected
according to
business needs
RV Raghu, director of information security professional asso- emails and links, scams and other threats that could compro-
ciation Isaca. “But before getting carried away, it is imperative mise user and data security,” she says.
Layer your approach
that enterprises understand that According to De Leeuw, a UTM-
deploying a UTM tool requires that based approach to centralised anti-
“E
to web security
Combining unified administrators have a deep under- nterprises need to understand spam and antivirus provides a man-
threat management
with other security
systems is essential
standing of how the tool will inter-
face with the existing infrastructure
that deploying a UTM tool
ageable and difficult-to-circumvent
layer of data and file protection.
to tackle threats
landscape,” he says. requires that administrators She says it reduces the risk of data
The other aspect which plagues being compromised by malware
Choosing cloud-
based security
all implementations of UTM, says have a deep understanding of corruption or ransomware hijacking,
services Raghu, is the fall in performance, machines being disrupted by mal-
Cloud-based security which can be experienced when how the tool will interface with ware infection, and also communi-

helps reduce costs for
firms with a growing
several services are turned on, with the existing infrastructure cations platforms being overrun by
cloud footprint some users indicating a steep fall in irrelevant and unwanted junk mail.
performance. “While this may seem RV R aghu, Isaca “A centralised approach can coun-
like a deal-breaker, it also points to ter any local client preferences or
the need for proper planning and design prior to implementing lapses in judgement and best practice. Thus, it can restore the
the solution, as well as close interaction between the enterprise messaging signal-to-noise ratio to a level where email is a net ben-
and its implementation partner,” he says. efit to the organisation, rather than having inordinate amounts of
For Mary-Jo de Leeuw, director of cyber security advocacy for storage space and user time wasted on junk mail, scams, threats
Europe, the Middle East and Africa (EMEA) at non-profit mem- and other security challenges,” says De Leeuw.
bership association for certified cyber security professionals To optimise the potential of a UTM system, Bickerstaffe recom-
(ISC) , web filtering is arguably the most powerful client-facing
2
mends that an organisation determines which of its functions to

computerweekly.com buyer’s guide 3


BUYER’S GUIDE
Home

Making unified
threat management
enable with reference to the threats faced by the business and What are you protecting?
a key security tool whether the respective functions offered by the UTM system Mike Gillespie, vice-president of the C3i Centre for Strategic
How unified threat meet security and business requirements. Cyberspace and Security Science (CSCSS), says using UTM
management can be
a useful tool when “Consideration should be given to the capacity of the UTM sup- means managing your own expectations. “It is vital before buy-
chosen correctly plier to add new functions and improve the functionality of exist- ing any security system to first establish what you are protect-
according to
business needs
ing ones as threats evolve,” she says. ing, why, and from what you are protecting it. Seems basic, but
The performance of the UTM platform should also be tested you would be amazed at the thought that sometimes fails to go
Layer your approach
prior to adoption to ensure it has the capacity to handle the loads into this part of a specification. For it to be the right tool for the
to web security that existing and new features can generate. job, you need to know what the job is,” he says.
Combining unified
threat management
with other security

FEODORA/ADOBE
systems is essential
to tackle threats

Choosing cloud-
based security
services
Cloud-based security
helps reduce costs for
firms with a growing
cloud footprint

computerweekly.com buyer’s guide 4


BUYER’S GUIDE
Home

Making unified
threat management
In addition, BCS’s Wenham says there needs to be an under- approach would be the implementation of a UTM appliance offer-
a key security tool standing of whether an infrastructure is to be completely rede- ing not just firewall, IDS [intrusion detection system] and IPS
How unified threat signed and rebuilt, or it is greenfield build, or whether it is a case [intrusion detection system] functions, but also content filtering
management can be
a useful tool when of selectively updating an existing infrastructure. and email spam and message handling, data loss prevention, VPN
chosen correctly “While the basics are the same in each case, such as the need [virtual private network] and endpoint control,” he adds.
according to
business needs
for an effective set of IT and information security management But implementing a UTM appliance with many functions may
processes and controls to be in place, there will be trade-offs require a partial redesign of an organisation’s infrastructure.
Layer your approach
and compromises between these
to web security approaches,” he says. Security failure
Combining unified
threat management
For a complete network rede- A complete network redesign With a UTM, there is a single point
with other security sign of an existing infrastructure, of failure in the corporate IT security
systems is essential Wenham says there is greater scope would offer greater scope in systems, warns CSCSS’s Gillespie.
to tackle threats
in UTM tool selection, from on-site
UTM network appliances to out-
UTM tool selection and should “While you may have combined
several functions into one platform
Choosing cloud-
based security
sourced cloud-based services, or a lead to an optimal solution but , (and supplier/manufacturer), you
services combination of approaches. He says are relying on all of those func-
Cloud-based security such a redesign should lead to an it would cause major disruption tions being carried out as efficiently,
helps reduce costs for
optimal solution for an organisation, accurately and comprehensively
firms with a growing while being implemented
cloud footprint but would typically cause major dis- as a single function offering could
ruption while being implemented. do, and to the same standard.
Updating existing infrastructure involves replacing existing Therefore, it is as strong as its weakest component,” he says.
infrastructure devices with a UTM appliance that offers greater Gillespie urges organisations that plan to deploy UTM to
capability and either a single unified management interface or establish a security architecture based around the security prin-
implements a software-based central management system offer- ciple of defence in depth by using technology from a variety of
ing UTM capabilities. suppliers and manufacturers.
Wenham says a basic approach to UTM could be to replace a UTM is not a panacea. People are needed to configure the UTM
firewall with a UTM appliance offering a firewall with intrusion systems, he says, so there is a risk of human error. “The ICO
detection and intrusion prevention. “A more comprehensive UTM [Information Commissioner’s Office] tells us that misconfigured

computerweekly.com buyer’s guide 5


BUYER’S GUIDE
Home

Making unified
threat management
software or hardware is one of the top causes of data breach with insight. You need to make sure you have your people and
a key security tool in the UK,” adds Gillespie. People are going to run, manage and plans ready to make the most of that insight.
How unified threat patch the UTM itself. Like all security technologies, UTM is constantly evolving. In
management can be
a useful tool when As an antidote to UTMs becoming a single point of failure, Isaca’s the age of GDPR and similar legislation around the world, where
chosen correctly Raghu says enterprises are encouraged to implement paired businesses are under increasing pressure to disclose breaches,
according to
business needs
devices, ensuring high availability. “It is imperative to understand the ability to forensically report on attacks will be key, says
that a UTM by itself is only one part of the puzzle and needs to Simon McCalla, chief technology officer at Nominet. “Knowing
Layer your approach
be part of an overall security strategy, especially considering that what data was stolen, and where it went, will need to be a key
to web security a host of new technologies that are offering for all cyber security sup-
Combining unified being adopted by enterprises bring pliers,” he adds.
threat management
with other security
systems is essential
their own challenges,” he says.
“W e need to manage our own UTM can be a useful tool to ena-
ble businesses of all sizes to bolster
to tackle threats
Manage expectations expectations of what a UTM their data protection capabilities
So on its own, a unified threat man- by providing a consolidated view of
Choosing cloud-
based security
agement system will not make a can   and can t ’
do ,as well as what is going on in the network, but
services
Cloud-based security
business compliant with legislation
like GDPR. Nor can it train staff.
knowing what we need it to do ” UTMs alone cannot solve all chal-
lenges relating to data protection.
helps reduce costs for
firms with a growing
“We need to manage our own Mike Gillespie, CSCSS Unified threat management tools
cloud footprint expectations of what a UTM can must be carefully selected and
and can’t do, as well as knowing tuned to meet the data protection
what we need it to do,” says Gillespie. “There is no point replac- needs of the particular business, staff must have the skills to inter-
ing a number of unnecessary security solutions from a range of pret what the UTM system tells them, and care must be taken to
suppliers with a number of unnecessary security solutions from ensure that a UTM does not represent a single point of failure by
a single supplier.” incorporating it in a robust, multilayered security architecture.
You need to make sure you have the skills, plan and team in place “An analysis of the pros and cons in the context of your organi-
and that you are able to act on intelligence that systems like these sation must be conducted before implementation and on an
generate. Again, this is part of managing your own expectation of ongoing basis to ensure that the UTM continues to meet your
what it can achieve and knowing that it can and will provide you requirements,” says Raghu. n

computerweekly.com buyer’s guide 6


BUYER’S GUIDE TO THREAT MANAGEMENT

Layer your approach


to web security T he World Wide Web (WWW) is celebrating its 30th
birthday. Among the many benefits it has given soci-
ety, the web has also become the perfect vehicle to
trick unsuspecting users into visiting rogue websites
containing malware.
Bridget Kenyon, global chief information security officer (CISO)
at Thales, says search engines such as Google and Microsoft
Bing have worked hard to remove malicious search results, but
while web browsers are filtering out most of the bad sites, it is
difficult to prevent the worst attacks. “Spear phishing is a lot
harder to recognise,” she adds.
The web has made it possible for users to jump easily between
different servers across the internet, without even being aware
that it is how web pages are rendered on their browsers.
For security professionals, ensuring users don’t acti-
vate malware that could attack the corporate network is
an uphill battle, often involving multiple security systems,
with each requiring administration. Unified threat man-
agement (UTM) is an attempt by the industry to simplify
security management.
Traditionally, UTM has focused on preventing and detecting
cyber attacks. Ideally, security incidents and breaches should be
prevented, says Maxine Holt, research director at Ovum.
However, organisations recognise that not everything can be
Combining unified threat management with other security prevented, so Holt says it is essential that the potential for a
systems and a strategic CISO is essential to defend security breach is detected while an attacker is in the network,
ALEX/ADOBE

against threats, writes Cliff Saran before the breach happens.

HOME

computerweekly.com buyer’s guide 7


BUYER’S GUIDE
Home

Making unified
threat management
“As we have seen with enterprise approaches McCalla urges CISOs to be wary of marketing
a key security tool to security across all sectors and in organisa- ❯Implementing UTM will hype. He says one major cyber security player
How unified threat tions of all sizes, there is increased focus on the help maintain good security was recently criticised for the inefficient alerts it
management can be and so help prevent breaches –
a useful tool when third objective of technology security controls – but it must be maintained
was giving the teams that used it. The technol-
chosen correctly responding to an attack,” she says. to work effectively. ogy was essentially accused of crying wolf, mean-
according to
business needs
More of these types of technology capabilities ing that security professionals ignored alerts, or
will be deployed as part of UTM. Data loss pro- turned them off all together. “This doesn’t mean
Layer your approach
tection (DLP) is generally included, but may be that the system wasn’t also flagging legitimate
to web security joined by data breach reporting capabilities to comply with the threats, but they were likely lost in the maelstrom,” he adds.
Combining unified EU’s General Data Protection Regulation (GDPR), for example. According to McCalla, one of the key areas which is often
threat management
with other security underlooked is domain name system (DNS) security, which
systems is essential Multiple layers of security offers a layer of protection that sits at the very gateway to your
to tackle threats
For Holt, the benefits of UTM, led by the reduction of complexity network. DNS is usually a reliable attack vector, as firewalls
in the security environment for small and medium-sized enter- often allow traffic through this way.
Choosing cloud- prises (SMEs), mean that UTM will be around for years to come. However, as McCalla points out, what is weak in the event
based security
services However, Simon McCalla, chief technology officer (CTO) at of an attack can be made strong in defence – if every packet of
Cloud-based security Nominet, says: “Having one system in place means there’s only data leaves or enters via the DNS, it can be used as a strong
helps reduce costs for
firms with a growing
one system to go wrong. A lack of redundancy systems means first line of defence.
cloud footprint that if the worst were to happen, there’s nobody on the subs’ “At the moment, UTM systems don’t pay much attention to
bench ready to come on and change the game. If the UTM sys- the DNS,” he says. “CISOs would be wise to consider a layered
tem fails, the criminals can essentially walk right in.” approach to cyber security, with bespoke tools for each poten-
Given that the profile of cyber criminals is changing and attack tial attack vector. Or, if a UTM system is the preferred method
vectors continually change, McCalla warns: “With a UTM sys- of protection, a backup system that sits at a DNS level should
tem, you’re reliant on the threat intelligence provider to be as be considered.”
quick as the criminals. If it’s not up to date, a business’s whole The other thing CISOs need to consider is what type of busi-
security posture is weakened, instead of just one element. This ness they are in, and where it might be vulnerable. For example,
leaves multiple attack vectors open to criminals, and makes the a manufacturing or industrial business will be vulnerable in dif-
business more vulnerable.” ferent areas to a bank.

computerweekly.com buyer’s guide 8


BUYER’S GUIDE
Home

Making unified
threat management
One thing that is clear, however, is that as businesses continue with malware – this happened to a casino when its connected
a key security tool to transform digitally, connecting more devices online, maintain- fish tank was hacked. To that end, CISOs should consider their
How unified threat ing a secure network environment becomes harder. Due to the spend. UTM systems may give them protection in areas they
management can be
a useful tool when interconnected nature of today’s businesses, a UTM tool likely don’t need, while leaving them vulnerable in others.
chosen correctly wouldn’t cover all bases anyway.
according to
business needs
Firewalls and anti-spam software are effective at catch- UTM is not a silver bullet
ing phishing emails aimed at employees, but they may not Simon Persin, director of Turnkey Consulting, warns that over-
Layer your approach
notice packets of data leaving a connected device infected reliance on a UTM system must be avoided. “If alerts are
to web security
Combining unified
threat management
with other security
systems is essential
to tackle threats

Choosing cloud- Firewalls and anti-spam


based security
services software are effective at
Cloud-based security
helps reduce costs for
firms with a growing catching phishing emails aimed
at employees, but they may not
cloud footprint

notice packets of data leaving


a connected device infected
with malware

ALEX/ADOBE
computerweekly.com buyer’s guide 9
BUYER’S GUIDE
Home

Making unified
threat management
switched off – possibly as part of an attack, as this would be Jirasek believes UTM, or any other technology for that mat-
a key security tool a target – effectiveness is seriously compromised,” he says. “In ter, is no good without well-executed processes. “Start with
How unified threat other words, using UTM shouldn’t mean foregoing controls at the critical controls implemented as processes, supported by
management can be
a useful tool when other levels throughout the organisation.” trained people, good configuration and managed technolo-
chosen correctly He adds that storage is another consideration. “UTM systems gies,” he says. “It is only then that we stand a realistic chance
according to
business needs
rely on vast amounts of stored data to detect patterns over to protect against data breaches.”
time as well as identify immediate threats. When implementing
Layer your approach
UTM, the team must understand the data requirements, avail- What next for UTM?
to web security ability of storage and potential impact on key applications prior As threats continue to evolve, so too will UTM tools. In the age
Combining unified to installing,” he says. of GDPR and similar legislation worldwide, where businesses are
threat management
with other security Vladimir Jirasek, managing director of specialised cyber secu- under increasing pressure to disclose breaches, McCalla believes
systems is essential rity consultancy and services company Jirasek Security, says: that the ability to forensically report on attacks will be key.
to tackle threats
“Sometimes I get into discussions pertaining to the use of the “Knowing what data was stolen and where it went will need to
latest technologies to thwart data be a key offering for all cyber secu-
Choosing cloud- breaches. In many cases, the debate rity suppliers,” he adds.
based security
services quickly steers into suppliers, capa- “C yber security starts with Nominet’s McCalla expects
Cloud-based security bilities and features. I try to get my processes at the hygiene level UTM tools to become more
helps reduce costs for
point across: cyber security starts expansive as they cover the ever-

firms with a growing
cloud footprint with processes at the hygiene level once these are implemented to increasing attack vectors available
– once these are implemented to criminals.
to a satisfactory level, add more a satisfactory level add , “They will also look at offering
advanced processes.”
He believes cyber security pro-
more advanced processes ” protection at a deeper network
level to cope with the plethora
cesses are undervalued in the Vladimir Jirasek, Jirasek Security of devices now connected to the
portfolio of security programmes. internet. Some sort of DNS protec-
“Companies put various technologies in place, in some cases tion capability will be essential,” he says.
implementing these without a care for how they will be managed, Ultimately, UTM systems – as with all types of threat pre-
monitored and integrated into the rest of processes,” he says. vention – will always be in responsive mode, tracking the

computerweekly.com buyer’s guide 10


BUYER’S GUIDE
Home

Making unified
threat management
latest threats and adapting accordingly. To that end, it will still or security camera – requires an open connection to the inter-
a key security tool require the guile of a strategic CISO to understand their own net, this provides a network port through which hackers can
How unified threat network, identify the weak points, and deploy tools accord- target attacks.
management can be
a useful tool when ingly. Whether that’s a UTM system, bespoke tools, or com- Understanding the health of the corporate network from
chosen correctly bination of the two, nothing will beat the strategic outlook of a a security standpoint – where are attacks being targeted or
according to
business needs
well-versed CISO. which exploits have broken through – is key to stopping or
The threat landscape has exploded as the web and services limiting damage from any attacks. UTM may go some way
Layer your approach
built on web technologies gain in popularity. Given that every to helping security admins manage the ever-changing threat
to web security device – whether it is a corporate PC, a smartphone or an inter- landscape by providing a single console to assess the overall
Combining unified net of things (IoT) device such as an internet-connected TV security posture of the corporate network. n
threat management
with other security
systems is essential
to tackle threats

Three network traffic patterns to watch out for and what to do about them
Choosing cloud-
based security
services 1. Generic patterns, known within the industry and likely to affect many organisations: Tools to detect these can be delivered by the UTM
Cloud-based security provider, and is potentially an area for the customer to consider when undertaking due diligence on the prospective supplier.
helps reduce costs for
firms with a growing
2. P atterns specific to individual organisations that are known about: This requires the UTM solution to be extendable so that custom
cloud footprint patterns can be defined to meet specific needs.
3. Patterns that are not yet known and therefore need to be defined: The UTM product could analyse the source data, for example, and
propose potentially undetected scenarios outside the previously known threats. This is where artificial intelligence may be most effec-
tively applied.
Once patterns have been identified, the right tools are needed in the operational world to generate a relevant response – such as an alert
or notification – direct to a nominated user, or the incident response system, should an anomaly occur. This should also include an aspect
of machine learning to assist where a potential violation has been repeatedly marked as an exception or false positive.

Source: Simon Persin, director of Turnkey Consulting

computerweekly.com buyer’s guide 11


BUYER’S GUIDE TO THREAT MANAGEMENT

Choosing cloud-based
security services I n early 2018, Niall Merrigan, an Irish cyber security expert
living in Norway, chanced upon the personal data of tens of
thousands of mobile phone subscribers in Thailand using
a free tool that scans content stored on Amazon’s Simple
Cloud Storage Service (S3). The data, including image scans of
drivers’ licences belonging to customers of Thai telco service
True Move H, was stored in S3 buckets with allegedly no security
measures in place to protect it.
“Simply, if you found the URL, you could download all their cus-
tomers’ scanned details,” Merrigan wrote on his blog. “In all, over
32GB of data existed in this bucket, totalling 46,000 files, neatly
organised by year.”
True Corp, the company that operates the True Move H ser-
vice, defended its security measures after the breach, claim-
ing that it had a “good security system” and that the data was
hacked by Merrigan.
The True Move H incident, following other S3 data leaks that
hit organisations globally, underscores the importance of cyber
security when moving to the cloud.
“There are still a lot of misconceptions about the cloud and the
kind of security and protection that companies will get when they
store their data there,” says Aaron Bugal, global solutions engi-
Cloud-based security services can help organisations with a neer at Sophos. “The most important thing to remember is that
CHAIWUTNNN/ADOBE

when companies put data in the cloud, it is imperative that they


growing cloud footprint to reduce costs and address the understand how it is being protected, and do not assume that
manpower crunch in cyber security, writes Aaron Tan security is being taken care of.”

HOME

computerweekly.com buyer’s guide 12


BUYER’S GUIDE
Home

Making unified
threat management
After a spate of S3 data leaks, Amazon rolled out another at Symantec. “This is one of the key benefits that all organisa-
a key security tool layer of protection in November 2018 to prevent accidental data tions welcome – especially small and medium-sized enterprises
How unified threat leakages. This includes tools to make sure administrators do [SMEs] that tend to have limited resources.”
management can be
a useful tool when not make data publicly accessible through a simple mistake or The increased use of mobile devices and applications in line with
chosen correctly misunderstanding. the bring-your-own-device (BYOD) trend has also contributed
according to
business needs
Although such tools are handy and should help enterprises to to the growth in adoption of cloud-based security systems, says
avoid costly cloud security mistakes, they are often not enough. Cunningham, noting that cloud-based security will give organisa-
Layer your approach
“More can still be done to ensure that data on the cloud is not tions greater business agility while ensuring critical information
to web security easily compromised,” says Bugal, remains protected.
Combining unified such as the need to understand the Other benefits of cloud-based
threat management
with other security type of data and whether or not C -
loud based security will services are the always-on avail-
systems is essential that data should be in the cloud in ability of such services to monitor
to tackle threats
the first place. Enterprises should give  organisations greater real-time threats, as well as simplic-
also understand the types of cloud ity, with suppliers taking care of the
Choosing cloud- models used by the provider, and
business agility while heavy lifting without enterprises
based security
services ensure the proper layers of protec- ensuring critical information needing to become cyber security
Cloud-based security tion, such as firewalls or intrusion experts. “Complexity is the enemy
helps reduce costs for
firms with a growing
prevention, are in place.  
remains protected of security,” says Sophos’s Bugal. “If
cloud footprint technical controls demand a high
Enter cloud-based security degree of knowledge to operate,
But faced with limited budgets and a dearth of cyber secu- they will most likely negatively affect the overall security posture
rity talent, many enterprises can’t do it all alone. That’s where of the business.”
cloud-based security – a growing market that Gartner expects In fact, the benefits of adopting cloud-based security are not too
to be worth $9bn by 2020 – comes in. different from those that drive enterprises to move to cloud-based
“Cloud-based solutions can help organisations save signifi- infrastructure or, more generically, IT outsourcing, according to
cant costs by eliminating the need to power the hardware-based the Cloud Security Alliance (CSA) APAC. “That would include
security equipment and physical space taken up by datacentres,” greater business agility, data availability, collaboration, simplicity
says John Cunningham, APAC vice-president for cloud security of updates and cost savings,” it says. “The scale stemming from

computerweekly.com buyer’s guide 13


BUYER’S GUIDE
Home

Making unified
threat management
cloud service providers’ extensive and distributed infrastructure of IDC’s IT security practice in Asia-Pacific.
a key security tool also provides the economies of scale and performance that are Enterprises should also consider their ability to manage these
How unified threat beneficial in protecting enterprises against attacks such as dis- offerings effectively, he says, because having a broad range of
management can be
a useful tool when tributed denial of service [DDoS].” supplier products inevitably leads to complexity and inefficiency –
chosen correctly However, the CSA APAC notes that the adoption of cloud- as well as the regulatory environment in which they are operating.
according to
business needs
based security is often a function of where an enterprise is Piff notes that some industries have more regulatory hur-
on the cloud adoption readiness scale. “Without the dles than others, and with privacy a growing issue
Layer your approach
right organisational mindset, governance and worldwide, enterprises should consider data
to web security compliance, architecture, skilled manpower, management as part of their cloud-based
Combining unified understanding of service level agreements security portfolio.
threat management
with other security and the shared responsibility model, just
systems is essential to name a few, an enterprise is essen- Managed security services
to tackle threats
tially not yet ready to take on anything In some cases, managing a suite of
cloud-based,” it says. cloud-based security services may not
Choosing cloud- “Just like you cannot port an enter- be viable because of a lack of in-house
based security
services prise’s on-premise infrastructure to the cloud overnight, the expertise and resources, or the need for customised cyber secu-
Cloud-based security same applies, even more so, to security. Of course, if an enter- rity programmes. A managed security service (MSS) could be
helps reduce costs for
firms with a growing
prise’s infrastructure is not fully cloud-based, there will be some the answer, providing a range of services from different security

CHA
cloud footprint areas of security that would still practically require some form of suppliers that scale on demand, including threat detection and

IWU
on-premise and hybrid solutions.” response, security testing, proactive threat hunting and digital

TN
N
forensic investigations.

N/A
Broad considerations

DO
“Some organisations, but very few, have the monetary and time

B
E

Before settling on any cloud-based security service (see the resources needed for building out and maintaining an infrastruc-
array of options on page 16), there are a number of broad con- ture that will deliver the same level of security that MSS provides,”
siderations to bear in mind. First, enterprises need to evaluate says Chris Schueler, senior vice-president of MSS at Singtel-
the pros and cons of each service delivery method and how it owned Trustwave. “In most cases, it is simply not feasible.”
fits into the current security infrastructure – and, critically, the Schueler notes that the talent gap, in particular, is driving some
future strategy of the business, says Simon Piff, vice-president enterprises to consider MSS offerings that are typically delivered

computerweekly.com buyer’s guide 14


BUYER’S GUIDE
Home

Making unified
threat management
by a team of highly skilled security specialists operating out of “Outsourcing all the knowledge and skills to a cloud vendor will
a key security tool security operations centres around the globe. “Enterprises are leave a skills gap should the need occur to bring offerings back
How unified threat finding it necessary to fight fire with fire by eliciting the help of on-premise,” says Piff. “Also keep an eye on the pricing, since it
management can be
a useful tool when ethical hackers, threat hunters and digital forensic investigators too is flexible.”
chosen correctly who have deep insight into cyber criminals’ tactics and ways that There is also the challenge of integrating cloud-based secu-
according to
business needs
they exploit vulnerabilities,” he says. rity offerings with on-premise security systems. To that end,
“If an enterprise is lucky enough to obtain these specialists, they Symantec’s Cunningham notes that many cloud-based security
Layer your approach
are finding it increasingly difficult to retain them because better services offer enterprises the ability to integrate with common
to web security offers and perks are always available. This puts the enterprise in a on-premise security information and event management (Siem)
Combining unified difficult situation because just one of these experts leaving to pur- and service orchestration platforms.
threat management
with other security sue another opportunity has the potential of crippling the entire But what is really needed is a shared security model, says Bruce
systems is essential security programme. The MSS model ensures expert support is Olson, director for worldwide public cloud sales at Fortinet.
to tackle threats
available and can scale as needed.” “A growing number of security vendors now offer cloud-
But IDC’s Piff warns that managed security services can based solutions that mirror tools available for local networks.
Choosing cloud-
be more expensive, with incident response and data being Standardising on a single set of solutions can reduce complex-
based security
services co-managed by a third party, and there could also be unique ity and enable the establishment of a single, consistent security
Cloud-based security challenges in data recovery. postures,” he says. “Make sure that these tools, whether local
helps reduce costs for
firms with a growing
or in the cloud, can be seen and managed through a single man-
cloud footprint Pitfalls and integration challenges agement interface to facilitate the collection and correlation of
For all their benefits, cloud-based services are updated as and threat intelligence and the ability to track and orchestrate uni-
when necessary by security suppliers. IDC’s Piff says this is not versal security policies.”
a problem if there is limited or no customisation, but organi- For software-as-a-service (SaaS) applications, Olson advises
sations often seek to customise systems to meet a perceived enterprises to adopt cloud access security brokers (CASBs) that
unique need, which can lead to problems. can be deployed either on-premise or in the cloud to establish
Also, consider that cloud is currently the most effective data- security policy enforcement points between cloud users and
centre operating model, and although IDC does not see anything cloud service providers to maintain security and inspect and
on the horizon to change this perception, other issues may arise
from a move back to an on-premise security infrastructure. continued on page 17...

computerweekly.com buyer’s guide 15


BUYER’S GUIDE
Home

Making unified
threat management
a key security tool
How unified threat
The various types of cloud-based services
management can be
a useful tool when Cloud-based security services run the gamut of risks, from data Email security: Phishing, business email compromise and user
chosen correctly loss prevention and email security to identity and access manage- impersonation are the most requested functions when it comes
according to
business needs
ment. Here are the common services of most interest to enter- to email security. Targeted attacks are on the rise, and success-
prises and security professionals, as well as Sophos’s take on what ful breaches are often attributed to a phishing attack or an email
enterprises should look out for in each service. account being compromised by poor password use.
Layer your approach
to web security
Combining unified Identity and access management (IAM): Flexibility is key to an Intrusion management: Clarity on discovered events is key here.
threat management
with other security identity and access management system. Given the vast number of Many products provide a dump of all attempts made and do not
systems is essential authentication directories available and some being proprietary in classify the severity of the event. Look for tools that have a very
to tackle threats
nature, it would be advantageous if the IAM system could be made good signal-to-noise ratio, where the noisy, low-priority events are
interoperable with third-party resources. filtered down, with potentially threatening events highlighted.
Choosing cloud-
based security
services Data loss prevention (DLP): Passive discovery is important in Security information and event management (Siem): When evalu-
Cloud-based security data loss prevention. Many organisations start down a path of ating a Siem system, do not necessarily base your organisation’s
helps reduce costs for
firms with a growing
DLP without knowing where their data is, how it is being used or needs on a supplier’s capabilities. Instead, decide based on what
cloud footprint how it should be classified. Data classification can become such a your current security, gateway and authentication controls declare
roadblock in a DLP project that it makes many enterprises give up. as best for the information they generate.
Look for a DLP provider that can enumerate data and use rules and
artificial intelligence to classify the data and simply report on its Encryption: Although many organisations consider encryption on
location and how it is being transported. mobile devices’ hard drives, they also need to consider where the
data from that device could end up eventually. As such, ensure your
Web security: Core features of a web security product should be encryption supplier does not just encrypt the data on the disk, but
user and device identification, requested destination, content filter- offers a choice of encryption before it reaches the public or private
ing, secure session decryption, inspection and solid reporting. cloud, and most definitely before it is copied to removable media.

computerweekly.com buyer’s guide 16


BUYER’S GUIDE
Home

Making unified
threat management ...continued from page 15
a key security tool
How unified threat secure data moving to cloud domains.
management can be
a useful tool when “As the use of SaaS applications grows from both enterprise and
chosen correctly remote locations, so does the need to enforce a consistent secu-
according to
business needs
rity policy at the user level. Cloud security must integrate security
controls from perimeter firewalls used to inspect all outbound
Layer your approach
traffic, including that generated by SaaS applications.”
to web security This gives enterprises an integrated view of their cloud and
Combining unified on-premise security posture, as well as a single feed and work-
threat management
with other security flow for incident response management.
systems is essential CSA APAC also recommends deploying software-defined
to tackle threats
perimeter (SDP) architecture as an alternative to a virtual private
network (VPN) for managing network security.
Choosing cloud- “SDP is able to provide the benefits of VPN – message confi-
based security
services dentiality and integrity – while overcoming the limitations of tra-
Cloud-based security ditional VPN products such as all-or-nothing access control to
helps reduce costs for
firms with a growing
the network.” it says. “It also allows organisations to have a cen-
cloud footprint tralised, policy-driven network security platform that covers their
on-premise infrastructure, cloud infrastructure and user popu-
lace, while reducing the attack surface.” n

CHAIWUTNNN/ADOBE
computerweekly.com buyer’s guide 17
BUYER’S GUIDE
Home

Making unified
threat management
a key security tool Common cloud-based security services (1/2)
How unified threat
management can be Service Threats addressed Challenges Optional features
a useful tool when Identity and access ✓ Identity theft ✓ Lack of standards and ✓ Support for DLP
management ✓ Unauthorised access vendor lock-in ✓ Granular activity auditing broken down
chosen correctly ✓ Privilege escalation ✓ Identity theft by individual
according to ✓ Insider threat ✓ Unauthorised access ✓ Segregation of duties based on
business needs ✓ Non-repudiation ✓ Privilege escalation identity entitlement
✓ Excess privileges ✓ Compliance-centric reporting
✓ Delegation of
Layer your approach authorisations
to web security ✓ Fraud
Combining unified
threat management Data loss prevention ✓ Data loss/leakage ✓ Data may be stolen from ✓ Rate domains
✓ Unauthorised access the datacentre virtually or ✓ Smart Response (integrated remediation
with other security ✓ Malicious even physically workflow)
systems is essential compromises of ✓ Data could be misused by ✓ Automated event escalation
to tackle threats data integrity the datacentre operator ✓ Automated false positive signature
✓ Data sovereignty or others employees compensation
issues with access ✓ Unstructured Data Matching
Choosing cloud- ✓ Regulatory sanctions ✓ Compliance requires ✓ File / directory integrity via hashing
based security and fines certifying cloud stack at ✓ Integration with intrusion detection systems
services all levels repeatedly
✓ False negatives/false
Cloud-based security positives (tuning)
helps reduce costs for
firms with a growing Web security ✓ Keyloggers ✓ Constantly evolving ✓ Rate domains
cloud footprint ✓ Domain content threats ✓ Categorise websites by URL/IP address
✓ Malware ✓ Insider circumvention of ✓ Rate sites by user requests
✓ Spyware web security ✓ Transparent updating of user mistakes
✓ Bot network ✓ Compromise of the web ✓ Categorise and rate websites as needed
✓ Phishing filtering service by proxy ✓ Categorise websites for policy enforcement
✓ Virus ✓ Potentially higher cost of
✓ Bandwidth real time monitoring
consumption ✓ Lack of features versus
✓ Spam premise-based solutions
✓ Lack of policy granularity
and reporting
✓ Relinquishing control
✓ Encrypted traffic
SOURCE: CLOUD SECURITY ALLIANCE

computerweekly.com buyer’s guide 18


BUYER’S GUIDE
Home

Making unified
threat management
a key security tool Common cloud-based security services (2/2)
How unified threat
management can be Service Threats addressed Challenges Optional features
a useful tool when E-mail security ✓ Phishing ✓ Portability ✓ Secure archiving
chosen correctly ✓ Intrusion ✓ Storage ✓ Web-mail interface
according to ✓ Malware ✓ Use of unauthorised ✓ Full integration with in-house identity system
business needs ✓ Spam webmail for business (LDAP, Active Directory, etc)
✓ Address spoofing purposes ✓ Mail encryption, signing and time-stamping
✓ Management of logs and ✓ Flexible integration
Layer your approach access to logs ✓ Data loss prevention (DLP) for SMTP
✓ Ensuring no access to and webmail
to web security
emails by cloud provider ✓ E-discovery
Combining unified staff ✓ Email system backup
threat management
with other security Intrusion management ✓ Intrusion ✓ Proliferation of SSL ✓ Central reporting
systems is essential ✓ Malware required by deployment in ✓ SIEM integration
to tackle threats public clouds adds ✓ Administrator notification
complexity or blocks ✓ Customisation of policy (automatic or manual)
visibility to network-based ✓ Mapping to cloud-layer tenancy
Choosing cloud- IDS/IPS ✓ Cloud sourcing information to reduce false
based security ✓ Complexity and positives and improve coverage
services immaturity of Intrusion ✓ Remote storage or transmission of integrity
Cloud-based security Management for APIs information, to prevent local evasion
helps reduce costs for ✓ Lack of tools to manage
instance-to-instance
firms with a growing
relationships
cloud footprint
Security information ✓ Abuse and nefarious ✓ Standardisation of log ✓ Heuristic controls
and event management use formats ✓ Specialised systems
✓ Insecure interfaces ✓ Timing lag caused by ✓ Physical log monitoring
and APIs translations from native ✓ Access control system monitoring
✓ Malicious insiders log formats ✓ Physical security integration (cameras,
✓ Shared technology ✓ Unwillingness of alarms, phone, etc)
issues providers to share logs ✓ Integration with call/ticketing system
✓ Account or service ✓ Scaling for high volumes
hijacking ✓ Identification and
✓ Unknown risk profile visualisation of key
✓ Fraud information
SOURCE: CLOUD SECURITY ALLIANCE

computerweekly.com buyer’s guide 19

Das könnte Ihnen auch gefallen