Network detection and response: the new network security paradigm

Tarek Kuzbari, regional director for the Middle East at Bitdefender, discusses.
Tech, Business, Bitdefender, Network, Security, CYBERSECURITY

Share

The threat of a cyber incident – at the hands of an adversary or an insider — looms large in organisations of all sizes.

In recent years, the number of sophisticated attacks on large infrastructures has surged, dealing billions of dollars in damage to enterprises worldwide. Malicious or negligent insiders further increase the risk of a breach or data leak. Making matters worse, the rapid adoption of cloud services and the Internet of Things (IoT) solutions, without proper safeguards, is expanding the attack surface for bad actors.

Large enterprises strive to build a secure ecosystem where multi-vendor components, on all levels, work seamlessly together. However, this is easier said than done in a dynamic infrastructure teeming with endpoints and just as many hands-on deck. While employees remain the weakest link in the attack kill chain, recent studies show rapid adoption of new technologies like Infrastructure as a Service (hybrid clouds), Industrial IoT (IIoT) and Bring Your Own Device (BYOD) practises are opening the floodgates to new waves of cyber incidents. One of the biggest problems IT security chiefs face is the speed with which their teams can detect and respond to a potential security incident.

Prevention is key, and speed is key to prevention

Prevention is better than cure, and nowhere is this more true than in cybersecurity. There is no one-size-fits-all solution for every kind of threat or infrastructure. However, in recent years, progressive organisations have started taking a pro-active approach to combating cyber incidents. Their new strategy ― which marks a paradigm shift for cybersecurity — deploys multiple layers of detection, prevention, and remediation for all kinds of threats, both external and internal, at the network level as well as at endpoint level.

Even if a sophisticated attack gets past one layer, security operations centres (SOCs) can still catch the attack somewhere in transit. However, because the time between detection and response is critical, for this strategy to work, some AI-magic is required ― automation. Moreover, according to a recent Forbes Insights survey, 75% of companies are falling way behind in this regard. To provide a solution that can achieve these goals, cyber security vendors have had to adapt their thinking as well. Enter Network Detection and Response.

Network Detection and Response

Network Detection and Response (NDR) — the brainchild of Network Traffic Analytics, Network Forensics and Endpoint Detection and Response ― combines advanced security traffic monitoring and analytics, in-depth investigative capabilities and remediation measures on both endpoint and network levels.

A next-generation solution, NDR enables SOC teams to perform fast triage, root cause analysis, and network-wide remediation. It supports both manual and automated remediation actions and saves time and resources without requiring additional hires or skill.

Network-centric security isn’t new, but it’s certainly a recent hot topic in the context of evolving cyber threats. To better combat advanced persistent threats, malware, malicious insiders or negligent behaviour, vendors have started to craft solutions using machine learning and behaviour analytics with insights from cloud threat intelligence derived from millions of sensors globally.

An immediate key benefit of leveraging behaviour analytics and threat intelligence is the drastic reduction of false positive alerts, and their associated condition known as alert fatigue, by consolidating similar alerts and pre-staging evidence in one view. Fast, automated alert triage enables SOC teams to dramatically improve how they handle incident investigation and threat response.

Choosing the NDR solution that’s right for you

Advanced threats call for advanced defences, and recent studies indicate the time to start prospecting is now. Your ideal NDR deployment leverages cloud threat intelligence based on data, collected from millions of endpoints globally, for out-of-band network traffic meta-data analytics based on AI, ML and advanced heuristics. Threat intelligence is key to achieving superior detection of advanced persistent threats with minimal false positives.

A business handling large clusters of customer data should prospect NDR solutions that only analyse traffic meta-data, eliminating the risk of exposing payload data on unencrypted communication, and ensuring compliance with both local and international data privacy laws. The exclusive focus on traffic meta-data eliminates privacy concerns surrounding non-encrypted traffic, but still lets SOCs identify network behaviour that violates policy. The ideal NDR deployment can further ease compliance by analysing encrypted traffic for suspicious behaviour without having to decrypt actual data packets.

Enterprises everywhere must protect corporate-issued endpoints, user-managed devices and network elements, as well as BYOD and IoT deployments. This is particularly true in most UAE and Saudi firms. A recent Honeywell study shows two thirds of companies operating in these countries view IoT as critical to growth. Besides the main pain points of protection, costs and skills, NDR will help dramatically in terms of interoperability within the IT ecosystem, especially for hybrid infrastructures with smart devices, IoT, Operational Technology (OT), and even legacy systems.

Finally, all prospecting NDR buyers should seek a single-pane solution that offers a bird’s eye view of all network activity across the infrastructure, saving them time and money without requiring an extensive, skilled staff to maintain the solution, while stepping up the security maturity ladder.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story