|    1-877-JESKELL     |

Jeskell Security Blitz: Security Gap #4 - Not Synching Network and Security Design

May 25, 2017 1:46:00 PM | Security

Double exposure of businessman working with new modern computer show social network structure and bokeh exposure.jpegOften times, we tend to think of security as an external concern.  We have infrastructure like servers and storage, networks for our communication, and a team for developing our applications.  Oh, and security, that goes on top.  That’s not to say that this approach won’t work.  It will cover many of the security threats.  But will it cover as many security threats as possible and will it do so in a way that supports your business processes?


Designing security as an afterthought can lead to incomplete pictures and difficulties for your organization.

Take packet inspection and packet capture, for example.  These are critical pieces to a mature security posture.  When designing a security plan, consider where in the network architecture you place them so you can capture or inspect the types of packets you want.  Have you considered what your business process needs are and how much they depend on being open to outside networks?  Ideally, you’ll develop a security plan that syncs those needs against the needs of security.  If not, your security tools can automatically block IPs that you need open or continue letting in data from IPs that have proven malicious.                

In the vast majority of cases, syncing network and security design does not require a total redesign of network architecture.  What it does require is a partner that understands both networking and security and can work through your existing architecture with a view toward both.  At Jeskell, we are experienced in both networking and security and can help guide an organization through the use of service engagements and product implementations.  Whether it’s a new tool you’re adding to your security kit or more tightly integrating existing tools, our experience can help.

< Back to All

Joseph Swartz

Have a cyber security question for Joey, the author of this post? Ask him here:

Ask Joey

Categories

Security

Subscribe now to get our latest news