Breach prevention is dead. Long live the 'secure breach'

By Tsion Gonen, chief strategy officer, SafeNet, Network World |  Security, data breach

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.

Think of this in terms of military defenses. Body armor, once the firewall of combat capable of defending against rocks and arrows, quickly became obsolete with the introduction of simple firearms. In World War II, aircraft carriers made battleships obsolete and today, stealth technology is making conventional radar obsolete. Offensive weapons are developed and perfected with the sole purpose of defeating the status quo defense.

EXPERT: Want a security pro? For starters, get politically incorrect and understand geek culture

REPORT: Line blurs between insider, outsider attacks

Breach prevention has been the status quo for years, and it is as helpless against today's new threats as armor was against firearms. People, however, are resistant to change. It is frightening to abandon the ways we've always done things, even when moving on is obviously the right thing to do.

To revisit the military metaphors, World War I clearly showed that machine guns, artillery and barbed wire made cavalry charges obsolete. And yet, every major military in the world maintained cavalry units through the beginning of World War II. Unfortunately, this stubborn adherence to the status quo always leads to carnage. Today's IT security carnage is playing out in newspaper headlines in the form of data breach reports.

So, how do we change the status quo and usher in the secure breach era, an approach to security that keeps valuable assets secure even when hostile intruders have penetrated the perimeter? Here's a four step program:

Originally published on Network World |  Click here to read the original story.
Join us:






Answers - Powered by ITworld

Ask a Question