I often equate network security to physical security. Company A hires a security guard, placing him at the front door of their building. Company A hires the best company that in turn employs the best security professionals.
Our guard is standing his post, checking ID’s and ensuring the safety of our resources. He completes daily status reports and clearly documents any incidents that took-place during his watch. Management has the opportunity to review the incident reports and identify if the security guard is performing as expected. Each new report allows management to adjust existing policy and introduce new controls to mitigate any risk identified by our security guard.
Most Internet connected organizations have some type of security controls in-place to protect them from internal and external risk. These controls may include a firewall, intrusion prevention system, malware scanner and a web content filter. Many organizations have transitioned to unified threat management (UTM) or next generation firewalls (NGFW) to provide greater control at the edge of their network. Each tool deployed has the ability to provide feed-back as to how well it is performing its job. Modern tools allow reporting data to be shared and correlated between devices in order to provide a more detailed picture.
Are you turning a blind eye to good security by not tracking and reporting on incidents identified by your security infrastructure? If your answer is yes, you are not alone. Click here to learn more about Dell SonicWALL’s dynamic network security and data protection product and services.