The Six Flaws that Can Emerge in a Network Security Strategy

Share and earn Cybytes
Facebook Twitter LinkedIn Email

An enterprise network can give the sense it’s alive.

It grows and evolves with time as new components are added. At the same time, these new components add complexity, increase risk and reduce visibility even as businesses are more reliant than ever on their networks.

All this change can sometimes mean the original network security strategy isn’t a fit anymore and fundamental flaws will naturally emerge. So, what are the fundamental flaws that might make an existing network security strategy ineffective? Below are six of the common flaws we see in our day-to-day work.

1) Volume exceeds capabilities.

Speed, throughput or volume on the network is surpassing the capacity of the current security solution to effectively monitor for threats.

2) Need for greater data granularity.

Security doesn’t have the granularity of data it needs to trace activities from endpoint to endpoint through your network. This is seen a lot when organizations begin to implement network threat hunting initiatives. For example, DNS logs aren’t granular enough or visibility is difficult between endpoints when transactions go onto the network and NetFlow isn’t cutting it.

3) Inconsistent enforcement of security policies.

The consistency of security policy enforcement can be compromised when many different technologies are employed. For example, two different firewalls on the same network will enforce seemingly identical policies differently. This problem multiplies as new security products are added to a network over time.

>>> Read the full post with the remaining flaws here: 6 Common Flaws that Can Emerge in a Network Security Strategy Over Time

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Bricata
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using specifically designed hunting workflows that use detailed metadata provided clearly and eases your transition from the known to unknown malicious activities in conjunction with an advanced threat detection and prevention platform which detects zero-day malware conviction.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?