Andre Vaux | Managing Director at claireLOGIC
Defence in Depth (DiD) is a cybersecurity strategy that uses multiple layers of security to protect a business’s critical assets and IT systems. Moving to this layered approach is effective as it secures all attack surfaces, and even if a malicious actor gets through one layer of defence with a novel attack method, they are likely to be stopped by a further layer of defence.
Following on from our first layer ‘Email and Web Security‘ – the second layer of defence is perimeter security. This layer includes technologies such as Next Generation Firewalls, Security Information and Event Monitoring and vulnerability management.
Next Generation Firewalls (NGFW) are the latest generation of firewall technology that provide features beyond a traditional firewall. For example, a NGFW includes additional features such as integrated intrusion prevention, application awareness and control, threat intelligence sources and the ability to address evolving security threats.
A NGFW can block advanced malware, as well as provide greater visibility over the network, making it easier to defend against threats.
Security and Event Management (SIEM) provides businesses with next-generation detection, investigation and response to uncovered threats. The detection and investigation components use behaviour analytics, AI and threat intelligence to find any suspicious activities. A SIEM solution will respond to these incidents with built-in orchestration.
This makes it easier for businesses to manage the massive amounts of security data that is being created at any point and prioritise the alerts and potential actions.
Vulnerability Management is the process of identifying, assessing, managing and remediating vulnerabilities across a business. Most vulnerability management solutions enable asset visibility and provide breach likelihood predictions to prioritise the most critical vulnerability on each asset, with recommendations on how to mitigate the associated risk.
Vulnerability management makes it possible to defend against all known threats, but it is a cyclical process, that needs to be constantly managed. With these technologies, many attacks will be stopped in their tracks before they get anywhere close to a business’s data.
Register your detail below to receive further cyber security content straight to your inbox.