Are Security Appliances fit for Purpose in a Decentralized Workplace?

Security appliances have been traditionally considered one of the most effective forms of perimeter security.
Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a business.
In researching the Common Vulnerabilities and Exposures database or CISA's Known Exploited Vulnerabilities catalog, one immediately discovers a deeply concerning picture, particularly for security appliance manufacturers.
Given how many organizations are understaffed and under-resourced, it's a Herculean task to stay abreast of these vulnerabilities, forget about continuously patching them.
Due to the volume of these potential exploits, security teams have to consciously leave their organizations unduly exposed.
Traditional security architecture is based on a castle and moat concept where security hardware such as firewalls, VPNs, intrusion prevention systems etc.
While operating systems like Windows and macOS have come a long way in making their software updates easy to deploy, the same can't be said for patching or updating hardware appliances.
Security appliances usually serve as critical infrastructure - organizations can scarcely afford to take security offline and security teams must always avoid causing any business disruption.
This is why security hardware such as routers, firewalls, secure web gateways, and IPS appliances are typically updated on weekends or holidays.
Patching security hardware is never seamless; it can lead to unexpected behavior of appliances, lengthy and frustrating troubleshooting, loss of productivity and increased risk of an incident.
Organizations don't just need awareness of these faults, they need to update and patch appliances before hackers can take advantage.
With the computing environment becoming more decentralized and remote working taking center stage, organizations seek security that allows centralized control and visibility over users, applications, devices, data and resources; one that can also support multiple locations.
This is where single-vendor SASE may offer advantages over traditional security hardware.
Convergence: Instead of having multiple security appliances that are siloed and disconnected from each other, single-vendor SASE converges multiple security functions such as a firewall, secure web gateway, IPS, zero-trust network access and data loss prevention, into a single whole.
Patching: In a traditional environment, security teams have to manually identify, physically connect and test multiple security appliances at diverse locations.
In a cloud environment, patching is centrally managed, eliminating the need to patch box-by-box.
SASE can provide CVE mitigation for zero-day vulnerabilities via virtual patching.
Cloud: Most security appliances are designed for on-prem, perimeter security.
This Band-Aid approach offers limited flexibility and makes security more complex than it needs to be.
Many organizations will transition from legacy and disjointed security hardware to cloud-native security technologies, taking note of government directives that have imposed mandates on appliance-based security due to their misconfigurations and rising risk of unpatched vulnerabilities.


This Cyber News was published on www.securityweek.com. Publication date: Tue, 02 Jan 2024 19:43:05 +0000


Cyber News related to Are Security Appliances fit for Purpose in a Decentralized Workplace?

Are Security Appliances fit for Purpose in a Decentralized Workplace? - Security appliances have been traditionally considered one of the most effective forms of perimeter security. Today, security appliances feature amongst the most riskiest enterprise devices and are a preferred method for threat actors to infiltrate a ...
1 year ago Securityweek.com
Exploring the Phenomenal Rise of Ethereum as a Digital Asset - In this exploration, we delve into the multifaceted layers of Ethereum's meteoric rise, dissecting the technological breakthroughs, the vibrant community dynamics, and the pivotal moments that have propelled it to the forefront of the digital asset ...
1 year ago Hackread.com Inception
The Power of Purpose - Today we released our annual Purpose Report, which reflects and celebrates the past year's work towards Powering an Inclusive Future for All-the progress we've made against our goals, and the people and lives we've touched. The report explores the ...
1 year ago Feedpress.me
Partnering for Purpose: A Year in Focus - This is typically the time of year when we take time to reflect, and looking back, 2023 has been a wonderful year of fulfillment and purpose for me, specifically in my role leading Partnering for Purpose. A global Cisco initiative, Partnering for ...
1 year ago Feedpress.me
CISA Orders Ivanti VPN Appliances Disconnected: What to Do - The United States Cybersecurity and Infrastructure Security Agency has given Federal Civilian Executive Branch agencies 48 hours to rip out all Ivanti appliances in use on federal networks, over concerns that multiple threat actors are actively ...
1 year ago Darkreading.com
Taking Back the Web with Decentralization: 2023 in Review - In the past few years, there's been an accelerating swing back toward decentralization. Users are fed up with the concentration of power, and the prevalence of privacy and free expression violations, and many users are fleeing to smaller, ...
1 year ago Eff.org
Strengthening Security Posture Through People-First Engagement - Regular, small doses of security education help combat the “forgetting curve,” a theory developed by Hermann Ebbinghaus that suggests people forget 75% of newly learned information within a couple of days. These statistics underscore a critical ...
5 months ago Informationsecuritybuzz.com
Embracing a Passwordless Future: Navigating the Shift to Decentralized Security in 2024 - The world has swiftly embraced digitalization, empowering individuals to accomplish over 90% of their daily tasks through mobile apps or web interfaces. Activities like bill payments, flight bookings, health consultations, and even exploring one's ...
1 year ago Cysecurity.news
CVE-2017-12244 - A vulnerability in the detection engine parsing of IPv6 packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause high CPU utilization or to cause a denial of service (DoS) condition because the Snort ...
5 years ago
Home AI Revolution: From Assistants to Smart Appliances - In a world where technology is advancing faster than ever, home AI has become an integral part of everyday life. Anachronistically speaking, a time-traveler from even just a few decades ago would be amazed at how far we've come in terms of home ...
1 year ago Securityzap.com Meow
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
10 months ago Blog.checkpoint.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
5 months ago Helpnetsecurity.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
1 year ago Cysecurity.news Inception
CVE-2016-6368 - A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort ...
7 years ago
CVE-2018-0233 - A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system ...
5 years ago
Alert: Chinese Threat Actors Exploit Barracuda Zero-Day Flaw - In recent developments, Barracuda, a prominent network and email cybersecurity firm, has been grappling with a zero-day vulnerability. In this blog, we'll look into the Barracuda zero-day flaw, exploring its intricacies and the consequential impact ...
1 year ago Securityboulevard.com CVE-2023-7101 CVE-2023-2868
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
5 months ago Cyberdefensemagazine.com
Barracuda fixes new ESG zero-day exploited by Chinese hackers - Network and email security firm Barracuda says it remotely patched all active Email Security Gateway appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers. The company deployed a second wave of security updates a day ...
1 year ago Bleepingcomputer.com CVE-2023-7102 CVE-2023-7101
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
9 months ago Esecurityplanet.com
Logicalis enhances global security services with the launch of Intelligent Security - Logicalis, the global technology service provider delivering next-generation digital managed services, has today announced the launch of Intelligent Security, a blueprint approach to its global security portfolio designed to deliver proactive ...
9 months ago Hackread.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)