Story image

Is any network 100% safe? Tips for hardening cyber defences

15 Jul 2016

Your client’s enterprise network, the data they hold and the application services they support are all directly in the cross-hairs of hackers, spies and opportunists of every stripe. And why not? Stolen data is a commodity worth money (or bitcoins!) on the open market. If your client has any sort of public profile they are a target for cyber-criminals. The bigger the enterprise, the bigger the target.

Your clients want to keep their private and sensitive commercial data safe and secure. And you want to be able to assure them that it is so. But can you really secure your customer’s data from all threats, especially criminals who are prepared to make a major effort to break into your network?

“Is any network 100% safe?” asks Dominic Whitehand, Managing Director of Exclusive Networks, Australia’s most experienced distributor for Fortinet, a global leader in the provision of cyber-security solutions. “Of course not. Even the White House, the Pentagon and the Kremlin get hacked. And they have massive security budgets and thousands of full-time black and white hat experts. But you can make it extremely difficult for all but the most well-funded and relentless crooks to even come close to getting inside your client’s networks. How? By hardening their cyber defences inside and out.”

Advanced persistent threats Today’s most damaging attacks, typically classified as Advanced Persistent Threats (APT), occur across the spectrum of possible attack vectors. Innovative malware, zero-day vulnerabilities and emerging evasion techniques can all render a single approach problematic.

“A deeper, more comprehensive approach is needed,” says Whitehand, “to counter these increasingly sophisticated attacks. Fortinet, and other security vendors, are all working hard to build a multi-layered defence-in-depth framework for combating these APTs.”

Prevent – The known threats Most malware is already known. Last year, nearly a quarter of malware was more than ten years old and almost 90% discovered before 2014.  Known threats can be blocked through next-generation firewalls, secure email gateways, endpoint security and other technologies. Previously unknown malware and targeted attacks, however, can hide from these measures. Dodgy traffic that seems suspicious should be handed off to the next point of your multi-layered defence.

Detect – The unknown Today’s more sensitive filters can detect previously unknown threats and create actionable threat intelligence. Sandboxing, for instance, isolates potentially malicious software in a sheltered environment so its full behaviour can be observed without affecting production networks.

“But sandboxing alone can’t stop everything,” continues Whitehand. “Attackers respond to new technologies by figuring out how they work and then finding ways around them. Indeed, smart crooks are already trying to compromise sandboxes. That’s why it’s important to stay updated. Just as criminals evolve, your client’s defences need to keep up as well.”

Mitigate – Taking action Once an intrusion has been validated, users, devices and content have to be quarantined. “Your clients need to have automated and manual systems in place to ensure the safety of network resources and data,” says Whitehand. “That’s to contain the damage. But you need to fight back. FortiSandbox, for instance, automatically forwards any new threats to the FortiGuard Labs for analysis, de-construction and remediation. This results in updates being fed back to the security devices and providing every layer with up-to-date protection.”

Integration is key “It’s not one particular technology that’s driving Advanced Threat Protection (ATP),” says Whitehand. “It’s the integration and collaboration amongst all of them. ATP relies on multiple types of technologies, products and research, each with different roles and each working in concert with one another. For example, FortiSandbox can integrate into FortiGate Next Generation Firewalls, FortiMail for inspection of attachments and FortiWeb web application firewalls for web-facing services.”

“We can expect to see continued cybercriminal innovation with an even greater focus on datacentres,” concludes Whitehand. “Your best strategy for clients is to deploy a multi-layered approach with established and emerging technologies which work together. No other approach can defend against today’s Advanced Persistent Threats. It’s a challenge, to be sure, but one that has to be met.”

For further information, please contact Exclusive Networks: E: fortinet@exclusivenetworks.com.au P: 1300 137 993 W: www.40net.com.au

Two Ministers’ thoughts on blockchain in Oz
Minister Karen Andrews, and Minister Simon Birmingham have released a joint statement on the national blockchain roadmap and extra $100,000 funding.
Apple launches revamped iPad Air & iPad mini
Apple loves tinkering with its existing product lines and coming up with new ways to make things more powerful – and both the iPad Air and iPad mini seem to be no exception.
IntegrationWorks continues expansion with new Brisbane office
The company’s new office space at the Riverside Centre overlooks the Brisbane River and Storey Bridge.
DXC subsidiary takes SAP energy industry partner award
Winners of the awards were selected from SAP’s A/NZpartner ecosystem and announced at the recent SAP A/NZ Partner Kick-Off Meeting held in Sydney.
Global server market maintains healthy growth in Q4 2018
New data from Gartner reveals that while there was growth in the market as a whole, some of the big vendors actually declined.
Emerging tech helps savvy SMB’s succeed
A CompTIA report shows SMBs are taking on the challenge of emerging technologies to reach their business goals.
Workflows should benefit people, not devices
It is important that, in digital transformation journeys, managers remember technology should complement, rather than overtake, employee talent and skillsets.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.