• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Prioritising Network Detection and Response in 2021

David Sajoto by David Sajoto
January 7, 2021
Photo by Fernando Arcos from Pexels

Photo by Fernando Arcos from Pexels

In 2021, Chief Information Officers (CIO) will need to take a closer look at how their IT infrastructure and security plans can be adjusted to better maintain business continuity.

As businesses realign their business continuity plans (BCP), business leaders will begin to move beyond the pandemic to readdress plans for disaster recovery and cybersecurity to manage and lower their risk.

A recent Deloitte research found that 85% of enterprises agree hybrid cloud is the “ideal” IT operating model, with 61% of respondents reporting the need for application mobility across clouds and cloud types as “essential.”

As hybrid work environments continue to stay mainstream in 2021, IT decision-makers have more time to consider what is working in their security strategy and what could be improved.

The pandemic has changed the way we access data, and the way we protect data needs to evolve as well. Increased cloud adoption and remote work will continue to push organizations to make new decisions on how to secure their infrastructure.

As we have seen in recent weeks, threats continue to become more sophisticated and threat actors are finding ways inside the organisation, targeting the most important data and systems, eyeing what brings them the most monetary value.

Identifying anomalous behaviour carries increasing importance once a malicious actor is on the inside of the hybrid network. Traditional defences focus on the perimeter and endpoints most often require agents to be deployed.

While these are essential components of a defence-in-depth, many organisations are reaching agent fatigue and understand that sophisticated attackers will get inside, and once there may tamper with agents and will almost certainly delete logs to cover their tracks.

The network, an oft passed by source for security, provides the greatest opportunity to covertly uncover attacks in progress on the network.

Network data is as close as you can get to the ground source of truth for every communication and interaction that takes place. It’s often said that “if it happened on the network – it happened.”

In the past, the complexity and volume of network data made it difficult to make use of this great resource. Organisations have come a long way to turn this unstructured data into a viable structured data source.

Using network data, Network Detection and Response (NDR), monitor all communications and employs machine learning to understand when abnormal behaviour is taking place on the east-west corridor to provide analysts with all the data they need to stop an attack once it’s inside the network.

If machine learning is taking place in the cloud, the speed and scale of data processing result in a faster response to threats.

By recording packet data, NDR can provide a valuable lookback source when the investigation is required to understand if you have been impacted by a threat like the recent Solarwinds SUNBURST exploit.

Solving visibility challenges with network data

Network data is a foundational source of information. In our interconnected digital world, everything—malicious or benign—crosses the network.

Visibility is a key component of cybersecurity. You have to see the activity to detect it. Network data tells you every IP, device, application and communication that is taking place.

Using this intelligence you can create a complete footprint across on-prem and cloud deployments and use machine learning to understand how the entire hybrid network should behave.

Inevitably, devices will connect to your network that do not or cannot have endpoint agents on them – like IoT or shadow IT. Using network data to discover those unmanaged devices you can monitor them for sketchy behaviour, and also provide intelligence as to where endpoints may not be instrumented or areas of your network that are unprotected.

Cloud acceleration and network data

We are living in a hybrid and multi-cloud world and this trend will continue. The complexity of these infrastructures makes seamless security coverage a real challenge. With this rapid acceleration of cloud adoption as a result of the pandemic, there is a strong case for network data as a central tenet of security. Network detection and response has enabled the same comprehensive visibility in the cloud. Higher-quality insights and fewer false positives will save time and prevent alert fatigue for chronically understaffed security professionals. Decisions can be made in real-time with context, based off of the most powerful, objective, complete source of data: the network.

Related:  PodChats for FutureCISO: Identity security in the cloud
Tags: cybersecurityExtraHophybrid cloudmulticloudNetwork Detection and ResponseSolarwinds SUNBURST
David Sajoto

David Sajoto

As vice president for APJ, David Sajoto is responsible for driving Extrahop’s go-to-market and business growth in Asia Pacific and Japan (APJ). He is an accomplished business leader with proven track records of building effective business strategy and customer-centric culture that leads to greater customer’s loyalty, hypergrowth and profitable organization across APJ. Prior to ExtraHop, Sajoto was the head of Enterprise business for APJ at Ixia where he built and grew the APJ Enterprise business significantly. He has also held leadership and general management positions in fast-paced industry leaders including Gigamon, Fluke Networks Systems, Compuware and Oracle.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe