The Autonomous Digital Enterprise- lets make it practical ( part 5 – Adaptive Cybersecurity )
The Autonomous Digital Enterprise- lets make it practical ( part 5 – Adaptive Cybersecurity )
- New Island Technologies
- No Comments
- Blogs
In today’s world, where businesses and individuals rely heavily on technology for communication, data storage and financial transactions, cybersecurity is of utmost importance. Serious security breaches are reported weekly in the news. Organisations involved, suffer from bad press, loss of revenue, loss of customer trust and are frequently exposed to large fines and lawsuits. Cyber threats are constantly evolving and traditional security measures may not always be enough to protect against them. Working from home during the pandemic also contributed to a significant increase in cybersecurity incidents due to increased cloud spend and usage.
In 2020 / 2021 security incidents:
- Increased by 188% overall
- Grew by 402% in retail
- Grew by 230% in manufacturing
- Grew by 205% in government
No longer are we just trying to prevent security vulnerabilities – the key is to detect vulnerabilities as soon as possible and action remediation based on vulnerability priority and impact.
Security teams currently deploy security scanners to detect infrastructure vulnerabilities. These scanners provide lists of thousands of devices and their vulnerabilities, usually in the form of IP addresses and common vulnerability exposure identifiers. This requires the Operations team to perform extensive, time-consuming, manual analysis. They then need to set priorities and remediate the vulnerabilities either through deployment of a patch or a configuration change. This can be an arduous task that involves mapping vulnerabilities to remediation actions, figuring out which devices relate to which business services and prioritising the actions needed.
Challenges experienced in current security estates include:
- Vulnerabilities remain unpatched for long durations
- Separate security and operations responsibilities, in which the security team scans for vulnerabilities and hands list to IT Ops to fix
- IT Ops does manual analysis of vulnerabilities and prioritisation, often based only on severity of the vulnerability
- IT Ops manually prepares patches, opens tickets, gets approvals, schedules, and executes patching
- Large, complex and dynamic environments hard to keep under compliance due to a lack of policy enforcement
- Services across multiple cloud platforms complicate the secure configuration of resources
- Widespread adoption of containers, microservices, and agile methodologies has increased the speed at which Dev teams release potentially non-compliant updates
Advanced targeted attacks make prevention-centric strategies obsoletAccording to Gartner the 4 stages of an adaptive cyber security architecture are:
Adaptive Cybersecurity is the evolution of security functions that can automatically sense, detect, react and respond to access requests, authentication needs and outside and inside threats, and meet regulatory requirements. The Adaptive Cybersecurity tenet is focused on using advanced security technologies, such as threat intelligence, behavioural analytics and machine learning, to automatically detect and respond to security threats. By automating these tasks, organisations can reduce the risk of data breaches and other security incidents.
BMC is a leading provider of IT solutions, and their Adaptive Cybersecurity solution is designed to provide businesses with a comprehensive and proactive approach to security.
Some key features and benefits of BMC Adaptive Cybersecurity solutions:
- Automated ingestion of vulnerability scan data, matched against remediation
- Automated prioritisation of response based upon multiple criteria and identification of potential blind spots and enrichment of vulnerability data with service context
- An automated end-to-end compliance and remediation process that covers cloud components (AWS, Azure, Chef, Docker), Servers and Networks over hybrid environments
- Extensive out-of-the-box policies based on recent CIS best practices, as well as custom policy creation
- Automated patching and remediation
- Centralised management: The solution provides businesses with a centralised dashboard that allows them to monitor their entire security infrastructure from a single location. This makes it easier to identify potential security risks and take appropriate action.
- Cloud-native architecture: BMC Adaptive Cybersecurity is built on a cloud-native architecture, which allows businesses to easily scale their security measures as their needs evolve. This also means that businesses can benefit from the latest security updates and patches without having to manually install them.
- Compliance management: BMC Adaptive Cybersecurity helps businesses comply with industry regulations and standards, such as HIPAA and PCI-DSS. This can help businesses avoid costly fines and penalties
Positive Business Outcomes when implementing an adaptive cyber security operation:
- Reduced or eliminated risk of breach
- Reduced duration of exposure to vulnerabilities
- Reduced risk of unmanaged devices
- Decreased effort spent analysing and patching
- Reduced audit effort
- Risk and cost reduction: Maintain compliance quickly, with pre-configured compliance policies for detection and enforcement
- Reduced risk and exposure of patched systems
- Reduced effort in pre- and post-patching activity
- Reduced effort to track and report against remediation SLAs and to create audit and compliance reports
- Reduced vulnerability exposure
- Reduce manual vulnerability remediation tasks
Anticipating threats before they happen and quickly jumping into action when they do, is a key component of the digital transformation of every business. Adopting an Adaptive Cybersecurity approach is just one tenet of the Autonomous Digital Enterprise, a forward-looking vision of the future state of business. Companies that want to not only survive but thrive as their business evolves must include the latest security measures and enabling technologies in their planning.
SHARE THIS BLOG






































You must be logged in to post a comment.