The Firewall business is approximately a $2B business today and with the emergence of “Next Generation Firewalls” the business is expected to grow to $8.5B business by 2019. Yet these types of technologies that traditionally were employed to protect the perimeter of networks allow only 20% visibility into a company’s network and vulnerabilities. What does that mean for the 80% of the network that is effectively in a true blind spot to company IT and cybersecurity teams? What this means to a larger enterprise is now just as relevant to a mid-market or regional branch of a larger company. It’s not a happy thought, in fact, one might say it’s the type of thought that will keep CISO’s and business leaders up at night.
With the amount and speed with which breaches are occurring today and the paths attackers take spanning access of customer information through a HVAC system, to Under Amor’s loss of 150 million users information through its MyFitnessPal app to Russia’s infiltration of United States power grids, the size scope and approaches for cyberattacks are growing, changing and mutating at viral speeds (pun intended).
So, this caused me to consider the standard approaches towards cybersecurity and why they will continue to fail. It’s no longer as important to protect the perimeter- in fact the definition of a “perimeter” of an organization’s vulnerability and attack surfaces is changing as the organization adopts cloud computing, mobility, IoT and more. It is also the need to protect from within an organization as well. These are some of the reasons we at Zoomdata think approaches like Hortonworks’ Cybersecurity Turnkey Solution (CTS), a multi-partner joint solution from Hortonworks, System Soft Technologies (SST), and Zoomdata built on a reference hardware from PSSC Labs, is crucial to fighting the ongoing cybersecurity battle. This is truly a village coming together to offer protection against malintent.
Never before have so many leaders in their respective markets come together to offer so many capabilities on one platform, with one consistent set of interactive visualizations. Not only do customers now have visibility into their network that they’ve never had before, but they are able to follow the data in real-time to understand that story, strategize on how to handle these vulnerabilities and better thwart them in the future.
CTS is going to allow organizations all sizes to have an all-in-one out of the box solution that provide real time threat hunting, reporting, compliance and unprecedented visibility into networks to will allow us to fight hackers in real-time. This could make dwell time a thing of the past.
For large and small organizations, cybersecurity is a major challenge. Especially given that the reasons for attacks are changing -- it’s not just about financial gain any longer. Often smaller regional banks, health care organizations or divisions of major corporations are left to their own defenses when it comes to cost-effective cybersecurity - there is nothing else on the market that offers the ability to scale up and down with needs, extreme ease of ordering and implementation, and does not require extensive training or high-level cybersecurity expertise.
We are on the cusp of democratizing cybersecurity with CTS.
To learn more about how Zoomdata can help tackle your cybersecurity challenges, please join us on November 13th at 12 pm PST for a live webinar on Branched Execution, The Evolution of a Kill Chain.