PCI Data Security Standard Calls for Next-Generation Network Security
by Rob Pollard - Arbor Networks - Wednesday, 13 December 2006.
- Assess: The solution should be able to learn the behaviors of networked applications and users and use this model to identify the presence of latent vulnerabilities.

- Monitor: The solution should collect real-time flow information from switches, routers, and packet capture devices on internal networks; it then would be able to evaluate each individual flow and detect deviations from normal network behavior.

- Enforce: The solution must be able to apply network access control and allow network security managers to deploy “virtual perimeters,” a new security technology that allows enterprises to generate and simulate the impact of internal switch or firewall rules.

- Report: The solution should provide details on security events, create policies, and implement procedures for protecting critical assets.

A solution that takes sophisticated network performance technology and applies it to the complex problem of internal network security finally will allow IT managers to control the entire networked landscape – maintaining control on the interior of the network while patrolling the perimeter. By providing visibility into the vulnerable areas of the interior and the normal behavior of its users, this new solution eliminates exposure to internal attack, facilitates the immediate detection of unauthorized data access, and ensures business continuity.

Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //