Sunday, May 20, 2018

Collaborative Defense in Depth



Hurry up; collaboration is losing in Security.

Cybercriminals are sharing zero-day vulnerabilities and credentials, selling corporate infrastructure details, renting out botnets for attacks, and creating easy-to-use, complex, automated tools and armaments — all of which are getting sold on Dark Web. So, how can IT organizations defend against these threats? One possibility is to improve collaboration among good professionals, both within and across organizations.

How?

Dynamic security analytics with AI that combines orchestration beyond the diversity of threats (as well as characters and processes) can help set the foundation for a robust security maneuvering. Collude is the glue that integrates disparate point products in a manner that extends their security capabilities beyond what each technology could afford on its own. Going deeply on each of them helps to control and integrate many different products as well as collect, prevent, and detect the threat.


Here it's the traditional defense in depth framework we have:

Fig1: Traditional Defense in Depth framework

Traditional security practices are unsustainable because there are too many nonintegrated tools for understaffed IT security departments to manage. One primary example of this is the integration that lacks on enabling collaborative defense at the Endpoint level. Today we have many different companies to provide many different solutions(e.g., EndPoint control), Solutions Architects tend to select multiple vendors to provide their solution and implement the workflow.


The uncomfortable situation that organizations face today regarding the collaborative defense is outside of them. For many reasons, they lack trust with other companies.

  • Corporate policies that forbid the communication of threat intelligence outside the company;
  • Lack of resources to define processes or operationalize IT sharing back into the community; and
  • Lacking trust in relationships.
  • Lack of processes to anonymize and share threat intelligence back into the community;
  • Fear of obligation from threat intelligence sharing;


Empowering Collaborative Defense at the Endpoint

Cybercriminals are well organized to devastated companies. Security architects struggle with the speed of changes we are facing today. To make it work, we need to create an ecosystem that enables, collaboration using Defense-in-Depth over multiple vendor integrations that satisfies traditional security practices.