Over the years, network security solutions and deployment has been built on the assumption that threats originate outside the enterprise network – trust was put in the internal network, while security was mostly deployed at the perimeter to provide protection from the outside threats and hackers. While security infrastructure has evolved to reflect the evolution of threats and technology, its deployment remained focus around the perimeter. However, breach analysis information shows that a significant number of threats have been entirely overlooked. According to the Verizon 2016 Data Breech Investigations Report, internal threats account for nearly 20 percent of enterprise attacks. And other industry sources indicate even higher rates, depending on the definition of internally originated attacks. It could be the result of employees “lending” their log-on credentials to visiting guests, bringing infected USBs into the workplace, receiving compromised data from a partner or vendor, or disgruntled employees.
Until recently, many companies have been relatively blind to what’s going on inside their network. By adopting an inside-out perspective, organizations can ensure security is a holistic, end-to-end solution.
Fortinet Blog
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.