Zero Trust Requires Effective Business-Centric Application Segmentation

Similar documents
IT Security s Responsibility: Protecting Mobile Certificates

Protecting Customer Experience Against Distributed Denial Of Service (DDoS)

Leverage Micro- Segmentation To Build A Zero Trust Network

Hybrid Cloud Adoption Gains Momentum

Consumer Web Portals: Platforms At Significant Security Risk

Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice

Firms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats

SMBs File Storage Needs Are Growing, But 57% Underestimate File Server Costs 45% Are Interested In Cloud Options

Crypto-Segmentation: Protecting Networked Applications When Firewalls Fail

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Capacity Management Benefits For The Cloud

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

The Cloud Manager s Balancing Act Balancing Security And Cost Without Sacrificing Time-To-Value

Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges

What are your firm s plans to adopt x86 server virtualization? Not interested

Privacy, Identity, And Security: A Spotlight On Why Insurance Companies Should Offer Identity Theft Solutions

Privacy, Identity, And Security: A Spotlight On How Financial Services Firms Can Help Protect Customer Identity

Best Practices For Public Cloud Security Part Three Of A Three-Part Series On Public Cloud Security

Why Endpoint Backup Is More Critical Than Ever

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Digital Business Requires Application Performance Management

Teradata and Protegrity High-Value Protection for High-Value Data

Records Management And Hybrid Cloud Computing: Transforming Information Governance

Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations

Hacking Crisis Highlights Crypto Chaos

Information Security Services

Data Security: Fight Insider Threats & Protect Your Sensitive Data

File Sync And Share Grows In The Enterprise: Capture The Benefits And Manage The Risks

Leverage A Third-Party Data Center To Deliver Increased Business Value

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring Organizations Find Real Value With Continuous Monitoring

Is Your Big Data Solution Production-Ready?

Leverage Cloud-Based Contact Center Technologies To Provide Differentiated Customer Experiences

Benefits Of Leveraging The Cloud Extend To Master Data Management

The Expanding Role Of Mobility In The Workplace

Which Managed Hosting And Private Hosted Cloud Option Is Right For You?

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Are SMBs Taking Disaster Recovery Seriously Enough?

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

VIGILANCE INTERCEPTION PROTECTION

Latest IT Trends For Secure Mobile Collaboration

Seize The Mobile Moment: Field Service Mobility Solutions Improve Customer Experience

Application Performance Management Is Critical To Business Success

Improving The Retail Experience Through Fast Data

The Move Is On To Open Source Integration Software

Endpoint Security Takes Center Stage Real-Time Prevention Is A Must-Have Capability

Application Delivery Controllers For Virtual Applications

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Networks Help Drive Affiliate Marketing Into The Mainstream Advertisers And Publishers Evolve As The Industry Shifts

Trends In Data Quality And Business Process Alignment

A Forrester Consulting Thought Leadership Paper Commissioned By Brother. December 2014

Hybrid Cloud Places New Demands On The Network

Intent Data Can Sharpen Your Competitive Edge

Top Unified Communications Trends For Midsize Businesses

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

A Custom Technology Adoption Profile Commissioned By Aerohive Networks. January Cloud Networking

Not All Cloud Solutions Are Created Equal: Extracting Value From Wireless Cloud Management

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

The Move Toward Modern Application Platforms

Are SMBs Taking Disaster Recovery Seriously Enough?

Top 10 Managed Hosting And Hosted Cloud Best Practices

People-Focused Marketing At The Speed Of Today s Connected Consumers Engage your Audience with Real-Time Context and Relevance

Private Or Public Cloud Isn t The Right Question It s Going To Be A Hybrid World

Voice Transformation Enables Many Business Benefits

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

A Tidal Wave of Dynamic Web Content Is Coming How Will You Respond?

A Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience

Page 2. Most Of The Information Workforce Now Works Remotely

Can Cloud Deliver Cost Savings Alongside Business Agility?

Strategically Detecting And Mitigating Employee Fraud

Future IT Capacity Planning Depends On Flexibility

How Organizations Are Improving Business Resiliency With Continuous IT Availability

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Seven Things To Consider When Evaluating Privileged Account Security Solutions

NATIONAL CYBER SECURITY AWARENESS MONTH

How to Secure Your SharePoint Deployment

Delivering New Levels Of Personalization In Consumer Engagement

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

The Necessity Of Cloud- Delivered Integrated Security Platforms

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

The Risks Of Do It Yourself Disaster Recovery

Managed Hosting And Private Hosted Cloud Both Are Viable Alternatives To Public And Virtual Private Cloud Models

Non-Geeks Guide to. Network Threat Prevention

Is It Time To Refresh Your Wireless Infrastructure?

IDENTITY SOLUTIONS: Security Beyond the Perimeter

Enable Mobility With Application Visibility At The Edge Of The Network

Enterprises Shift To Smart Process Apps To Engage Customers

UC And Collaboration Adoption By Business Leads To Real Benefits

Reduce Your Virus Exposure with Active Virus Protection

Are You Ready for PCI 3.1?

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Anti-exploit tools: The next wave of enterprise security

The State Of Public Cloud Security Part One Of A Three-Part Series On Public Cloud Security

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Big Data Ups The Customer Analytics Game

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Combating a new generation of cybercriminal with in-depth security monitoring

Transcription:

Zero Trust Requires Effective Business-Centric Application Segmentation GET STARTED

Zero Trust Requires Effective Business-Centric Application Segmentation To protect the network from today s sophisticated attacks, IT security decision-makers must adopt a Zero Trust approach to network security. Hackers use multiple attack methods to find a network s weakness, even targeting business partners and suppliers to get inside. Many enterprises today rely on outdated network defenses that protect the perimeter but will not protect them from bad actors already inside their network or risks posed by compromised users. To properly protect their enterprises, security architects need to adopt a policy of Zero Trust in their networks and look to meet the security challenges of the 21st century by focusing on effective application segmentation aligned with business objectives. In August 2015, Certes Networks commissioned Forrester Consulting to evaluate current application and network segmentation strategies in the wake of increasingly sophisticated attack methods. Demographics 50 US IT security decisionmakers with responsibility for network security in organizations with 500+ employees.

1 2 3 Data Breaches Plague Organizations Today It seems like every day a new data breach is making headlines. According to Forrester s Global Business Technographics Security Survey, 2015, 41% of US security pros estimate that their firm s sensitive data was potentially compromised or breached in the past 12 months. Hackers are targeting companies they perceive as vulnerable; 36% of organizations have been breached more than once in the past year! Data breaches can seriously damage a company s revenues, reputation, and brand image. 36% of US organizations in our Global Security Survey have been breached more than once in the past year!

1 2 3 Hackers Expand Their Sights To Breach Targets There is much more sophistication in the way hackers attack their targets today. They launch organized, sustained attacks with a variety of methods in order to get to their main target. Attacks are not just external and targeting the organization; internal incidents account for a large number of breaches today. In many cases, partners or third-party suppliers are being compromised and used as a gateway to access the target enterprises sensitive data. For instance, law firms are targeted to gain access to their client s sensitive financial information. Organizations can no longer assume that their networks provide adequate security so long as they have a strong defense against external threats. This is the basis of the Zero Trust security model. We have found that: 34% of organizations that have experienced a breach were victims of an internal incident. 46% were targeted through a partner or third-party supplier

1 2 3 Effective Attack Vectors Expose Vulnerabilities External attacks are carried out through a variety of methods and involve multiple steps, targeting not only vulnerable applications and networks, but also vulnerable employees and partners. Forrester s Business Technographics Security Survey, 2015 shows that 30% of external attacks were carried out through the use of stolen credentials, and 27% through user interaction. Attacks today are also increasingly happening without malware, with hackers running scripts and moving throughout the network once they have access with valid but compromised user credentials, which makes them difficult to detect.

1 2 Segmentation Technologies Are Fragmented And Ineffective Most firms rely on fragmented, outdated technology to segment applications and networks that were implemented before today s sophisticated attack methods were created. These networks rely on defenses, such as VPNs and perimeter firewalls, that many methods can bypass. Network and application segmentation is fragmented. Most firms use multiple technologies to segment their networks, creating silos that leave some areas of the network less secure than others because of gaps or inconsistencies in these silos. 70% of respondents use VLANs to segment internal networks, but VLANs are part of network infrastructure and are designed to improve traffic flow. They do not provide strong security controls for role-based access to applications and fail to limit attackers ability to move throughout the network.

1 2 Segmentation Controls Are Outdated Most organizations use network segment access controls that are designed almost exclusively to protect infrastructure and are tied to infrastructure components. Such controls are outdated in the face of borderless applications, public cloud migration, increasingly mobile users, and sophisticated new attacks. The most popular methods network access control (78%), identity and access management credentials (66%), and directory-based access controls (52%), are usually used at the network perimeter. Once a hacker is in the network, they are free to move laterally though the network undetected, effectively hopping from app to app. Even when enterprises enforce user role-based access, this is usually only one of several methods and there are alternate ways to gain access and circumvent such controls.

1 2 Zero Trust Architectures Rely On Effective Business-Centric Application Segmentation In order to embrace the tenets of Zero Trust of the network, security architects must redesign their segmentation around business needs to effectively protect against today s attacks. If firms do not effectively segment business applications and place too much trust in networks, hackers can easily move laterally within a network once they gain access. This makes application segmentation an essential practice of proper security hygiene. However, organizations must be sure to use the right tools for the job. Almost all firms use some form of segmentation and the majority use segmentation as a best practice for security (63%) and for regulation and compliance (59%).

1 2 Prevent Breaches With Application-Based Segmentation Organizations must make sure they are using segmentation technologies like application-based cryptographic segmentation with role-based access control. The technology must translate directly to business security needs and protect business applications within the network and outside of the network, even when perimeter is breached and the network is compromised. Current network segmentation practices are infrastructure-centric and perimeter-based. Only a minority, 40%, are doing application-specific segmentation and only 22% use microsegmentation. Unfortunately, because of the infrastructure-centric approach to security, only 54% of firms can say that they were not breached in the past 12 months. The right business-centric approach with applicationbased cryptographic segmentation and role-based access control needs to be adopted more widely to stop this alarming avalanche of breaches. Only 40% of respondents report that they are doing applicationspecific segmentation; only 22% use microsegmentation.

Conclusion To embrace Zero Trust, companies must adopt business-centric application segmentation. Attackers are becoming more sophisticated every day and will prey on companies that still implicitly trust their networks and are not sufficiently protected with effective segmentation technologies. Many enterprises today rely on outdated segmentation technologies that emphasize infrastructure over business applications and secure the perimeter but offer no protection once attackers are in the network. Security architects need to be sure they are using the right segmentation technologies to secure their applications. METHODOLOGY This Technology Adoption Profile was commissioned by Certes Networks. To create this profile, we leveraged Forrester s Global Business Technographics Security Survey, 2015. Forrester Consulting supplemented this data with custom survey questions asked of US IT security decision-makers responsible for their organization s network security. The auxiliary custom survey was completed in September 2015. For more information on Forrester s data panel and Tech Industry Consulting services, visit forrester.com ABOUT FORRESTER CONSULTING Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting. 2015, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to forrester.com. 1-VAI1YT