Connect with us

Featured

Dirty secret of network traffic

Published

on

Sophos recently announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45 percent of their organisation’s network traffic.

In fact, nearly one-in-four cannot identify 70 percent of their network traffic. The lack of visibility creates significant security challenges for today’s businesses and impacts effective network management. The survey polled more than 2,700 IT decision makers from mid-sized businesses in 10 countries including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa.

Considering the debilitating impact cyber-attacks can have on a business, it’s unsurprising that 84 percent of respondents agree that a lack of application visibility is a serious security concern. Without the ability to identify what’s running on their network, IT managers are blind to ransomware, unknown malware, data breaches and other advanced threats, as well as potentially malicious applications and rogue users. Network firewalls with signature-based detection are unable to provide adequate visibility into application traffic due to a variety of factors such as the increasing use of encryption, browser emulation, and advanced evasion techniques.

“If you can’t see everything on your network, you can’t ever be confident that your organisation is protected from threats. IT professionals have been ‘flying blind’ for too long and cybercriminals take advantage of this,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “With governments worldwide introducing stiffer penalties for data breach and loss, knowing who and what is on your network is becoming increasingly important. This dirty secret can’t be ignored any longer.”

On average, organisations spend seven working days remediating 16 infected machines per month. Smaller organisations (100-1,000 users) spend on average five working days remediating 13 machines, while larger organisations (1,001-5,000 users) spend on average 10 working days remediating 20 machines per month, according to the survey.

“A single network breach often leads to the compromise of multiple computers, so the faster you can stop the infection from spreading the more you limit the damage and time needed to clean it up,” said Schiappa. “Companies are looking for the kind of next-generation, integrated network and endpoint protection that can stop advanced threats and prevent an isolated incident from turning into a widespread outbreak. Sophisticated exploits such as MimiKatz and EternalBlue reminded everyone that network protection is critical to endpoint security and vice versa. Only direct intelligence sharing between these two can reveal the true nature of who and what is operating on your network.”

IT managers are very aware that firewalls need an upgrade in protection. In fact, the survey revealed that 79 percent of IT managers polled want better protection from their current firewall. 99 percent want firewall technology that can automatically isolate infected computers, and 97 percent want endpoint and firewall protection from the same vendor which allows for direct sharing of security status information.

Security is Not the Only Risk to Businesses

Following security risks, lost productivity was cited as a concern for 52 percent of respondents when it comes to a lack of network visibility. Business productivity can be negatively impacted if IT is unable to prioritise bandwidth for critical applications.

For industries that rely on custom software to meet specific business needs, an inability to prioritise these mission critical applications over less important traffic could be costly. 50 percent of IT professionals who had invested in custom applications admitted that their firewall could not identify the traffic and therefore were unable to maximise their return on investment. Lack of visibility also creates a blind spot for the potential transfer of illegal or inappropriate content on corporate networks, making companies vulnerable to litigation and compliance issues.

“Organisations need a firewall that protects their investment in business-critical and custom applications by allowing employees to have prioritized access to the applications they need,” said Schiappa. “Increasing network visibility requires a radically different approach. By enabling the firewall to receive information directly from the endpoint security, it can now positively identify all applications – even obscure or custom applications.”

The Dirty Secrets of Network Firewalls survey results are available in a PDF report: https://secure2.sophos.com/en-us/medialibrary/Gated-Assets/white-papers/firewall-dirty-secrets-report.pdf?la=en

The Dirty Secrets of Network Firewalls survey was conducted by Vanson Bourne, an independent specialist in market research, in October and November 2017. This survey interviewed 2,700 IT decision makers in 10 countries and across five continents, including the US, Canada, Mexico, France, Germany, UK, Australia, Japan, India, and South Africa. All respondents were from organisations of between 100 and 5,000 users.

Sophos can deliver higher levels of network visibility with the XG Firewall and Sophos Endpoint Protection or Intercept X. For information about Sophos XG Firewall, please visit: https://www.sophos.com/en-us/products/next-gen-firewall.aspx

Featured

Legion gets a pro makeover

Lenovo’s latest Legion gaming laptop, the Y530, pulls out all the stops to deliver a sleek looking computer at a lower price point, writes BRYAN TURNER

Published

on

Gaming laptops have become synonymous with thick bodies, loud fans, and rainbow lights. Lenovo’s latest gaming laptop is here to change that.

The unit we reviewed housed an Intel Core i7-8750H, with an Nvidia GeForce GTX 1060 GPU. It featured dual storage, one bay fitted with a Samsung 256GB NVMe SSD and the other with a 1TB HDD.

The latest addition to the Legion lineup has become far more professional-looking, compared to the previous generation Y520. This trend is becoming more prevalent in the gaming laptop market and appeals to those who want to use a single device for work and play. Instead of sporting flashy colours, Lenovo has opted for an all-black computer body and a monochromatic, white light scheme. 

The laptop features an all-metal body with sharp edges and comes in at just under 24mm thick. Lenovo opted to make the Y530’s screen lid a little shorter than the bottom half of the laptop, which allowed for more goodies to be packed in the unit while still keeping it thin. The lid of the laptop features Legion branding that’s subtly engraved in the metal and aligned to the side. It also features a white light in the O of Legion that glows when the computer is in use.

The extra bit of the laptop body facilitates better cooling. Lenovo has upgraded its Legion fan system from the previous generation. For passive cooling, a type of cooling that relies on the body’s build instead of the fans, it handles regular office use without starting up the fans. A gaming laptop with good passive cooling is rare to find and Lenovo has shown that it can be achieved with a good build.

The internal fans start when gaming, as one would expect. They are about as loud as other gaming laptops, but this won’t be a problem for gamers who use headsets.

Click here to read about the screen quality, and how it performs in-game.

Previous Page1 of 3

Continue Reading

Featured

Serious about security? Time to talk ISO 20000

Published

on

By EDWARD CARBUTT, executive director at Marval Africa

The looming Protection of Personal Information (PoPI) Act in South Africa and the introduction of the General Data Protection Regulation (GDPR) in the European Union (EU) have brought information security to the fore for many organisations. This in addition to the ISO 27001 standard that needs to be adhered to in order to assist the protection of information has caused organisations to scramble and ensure their information security measures are in line with regulatory requirements.

However, few businesses know or realise that if they are already ISO 20000 certified and follow Information Technology Infrastructure Library’s (ITIL) best practices they are effectively positioning themselves with other regulatory standards such as ISO 27001. In doing so, organisations are able to decrease the effort and time taken to adhere to the policies of this security standard.

ISO 20000, ITSM and ITIL – Where does ISO 27001 fit in?

ISO 20000 is the international standard for IT service management (ITSM) and reflects a business’s ability to adhere to best practice guidelines contained within the ITIL frameworks. 

ISO 20000 is process-based, it tackles many of the same topics as ISO 27001, such as incident management, problem management, change control and risk management. It’s therefore clear that if security forms part of ITSM’s outcomes, it should already be taken care of… So, why aren’t more businesses looking towards ISO 20000 to assist them in becoming ISO 27001 compliant?

The link to information security compliance

Information security management is a process that runs across the ITIL service life cycle interacting with all other processes in the framework. It is one of the key aspects of the ‘warranty of the service’, managed within the Service Level Agreement (SLA). The focus is ensuring that the quality of services produces the desired business value.

So, how are these standards different?

Even though ISO 20000 and ISO 27001 have many similarities and elements in common, there are still many differences. Organisations should take cognisance that ISO 20000 considers risk as one of the building elements of ITSM, but the standard is still service-based. Conversely, ISO 27001 is completely risk management-based and has risk management at its foundation whereas ISO 20000 encompasses much more

Why ISO 20000?

Organisations should ask themselves how they will derive value from ISO 20000. In Short, the ISO 20000 certification gives ITIL ‘teeth’. ITIL is not prescriptive, it is difficult to maintain momentum without adequate governance controls, however – ISO 20000 is.  ITIL does not insist on continual service improvement – ISO 20000 does. In addition, ITIL does not insist on evidence to prove quality and progress – ISO 20000 does.  ITIL is not being demanded by business – governance controls, auditability & agility are. This certification verifies an organisation’s ability to deliver ITSM within ITIL standards.

Ensuring ISO 20000 compliance provides peace of mind and shortens the journey to achieving other certifications, such as ISO 27001 compliance.

Continue Reading

Trending

Copyright © 2019 World Wide Worx