Cloud Security and Data Center survey revealed to the world that malware containment and data recovery are keeping data centers techies all night long. The poll study conducted by security and risk professionals from SANS Institute Community revealed that more than half of survey respondents were dissatisfied with the length of time it takes them to contain and recover from hacker infiltration and malware infections.
The wide gap of response time was the result of the inability of some traditional security tools to assist organizations in detecting and managing assault scenarios. Most survey respondents use traditional security tools such as firewalls, intrusion detection systems, intrusion prevention systems, identity and access management and anti-malware to monitor data traffic between data centers and internal/external clouds. Thus, by such practices most of them are unhappy with the level of visibility and containment speeds they get.
Dave Shackleford, a senior analyst at SANS Institute feels that an improvement in security stance will offer better visibility which will open the ability to make configuration changes faster and helps in containing attacks more quickly.
Dave who was the main contributor of “The State of Dynamic Data Center and Cloud Security in the Modern Enterprise” report went deeper in revealing the challenges organizations face when trying to prevent and contain breaches. The report provides guidance and suggestions on how to better secure today’s modern infrastructure.
Thus, the survey clearly underlines the fact that security breaches are inevitable. Rather than keeping out attackers entirely, the goal has shifted towards detection, response and remediation.
The 2014 Data Breach Investigations Report published by communications giant Verizon shows that data security incidents and breaches are increasing with each passing year. The report which covered 50 organizations across 95 countries revealed that there was as many as 63,437 data security incidents reported in 2013, out of which 1,367 incidents pertained to a confirmed data breach.
Equally alarming is the finding that not all the security incidents were aimed at data-theft or misuse. Most of them were aimed at sabotage or merely having fun or seeking vengeance.
Worried about your enterprise data center security?
Dynamic Network Factory (DNF) will work with enterprise data personnel to evaluate the existing encryption strategies and policies. This process will start with getting detailed asset information on your organization’s hardware and software environment, sensitive data, and current security policy management sets. In combination with your corporate objectives, DNF Data Security team will determine the business objectives for encrypting data-at-rest. From these objectives, DNF will derive a plan and proposal to address the policies, architecture, and scope of the project to keep you protected to the fullest.
Call 510 265 1616 to know more