Security platforms have been around for a while. When Next-Generation Firewalls (NGFW) appeared on the scene – able to blend several products into a single platform, reducing IT overhead and simplifying setups – they quickly became the cornerstone for security in nearly every organization worldwide.
But many NGFW solutions are not without their own set of challenges. Far too often, the various technologies pre-loaded onto the device (firewall, IPS, VPN, web filtering, antivirus, and sandboxes) do not work together seamlessly. While they may be wrapped in a single piece of sheet metal, many of its components actually require separate management consoles, and even run on different operating systems. Compounding the problem further, the quality of the technologies embedded within that single device is also frequently lacking. While such a platform may have a top-notch firewall, for example, the rest of the security roster may include a second-rate IPS or web filtering solution that customers will need to either just learn to live with, or that they will have to replace with another box.
Such solutions defeat the whole purpose of buying an “integrated” solution, which is to simplify management and reduce vendor and solution sprawl through consolidation.
This challenge isn’t limited to supposedly integrated devices. Today’s digital landscape now consists of multi-cloud environments, data centers comprised of both physical and virtual infrastructures, distributed branch offices, mobile workers, and home offices. This ever-growing complexity means that simply placing a security device at the network edge is no longer sufficient. Complex challenges require seamless and integrated solutions. But due to the unique requirements and challenges of each new network environment, building a streamlined solution can be challenging. As a result, security solutions are often Frankensteined together across the network, creating further complexity and leading to security gaps.
A recent IBM survey suggests there is an average of 45 security tools deployed inside any given organization, with each incident requiring coordination across 19 different tools. The key issue here is that these tools, whether deployed as separate solutions or as disparate tools wrapped inside a single box, are not natively designed for this level of interoperability. As a result, vendor and solution sprawl growing problems, preventing the use of automation to simplify processes and requiring the hand-correlation of threat intelligence to enable responses. IBM also reports that dwell time for security breaches is now measured in months, with costs exceeding $8.6 million per breach, in large part because cybercriminals can exploit the visibility gaps created by the inability to unify security functionality
A new approach is needed that weaves all critical security functionality into a unified solution that protects the entire network while enabling secure data and application access for users, regardless of location. To work in modern distributed network environments, an effective security platform must be built around the following three concepts:
Today’s challenges require new security strategies and systems that can dynamically adapt alongside the networks they need to protect. A security platform has long been the right approach for organizations’ security needs, but this idea requires updating for effectiveness in today’s dynamic, high performance, hyperconnected networks. Such platforms must now be able to seamlessly span the entire network and adapt to an ever-evolving threat landscape. Designing such a platform around the three critical components of broad deployability, integration, and automation is key.
This is a summary of an article written for Security Week by John Maddison, EVP of Products and CMO at Fortinet. The entire article can be accessed here.
Find out how the Fortinet Security Fabric platform delivers broad, integrated, and automated protection across an organization’s entire digital attack surface to deliver consistent security across all networks, endpoints, and clouds.