Enterprise networks are constantly changing. They become more complex as new-generation technology transforms traditional architectures. Enterprises of all sizes and industries are realizing that traditional cybersecurity approaches are no longer effective. Cyberattacks of the past were often grandiose, overt and blatant. Today’s attackers prefer to move slowly and low, creating command and control channels that allow them to steal valuable information over long periods of times while remaining undetected. However, due to the increasing complexity of networks, it is becoming more difficult to see these threats. These blind spots can be caused by many factors and can often lead to bottlenecks that can slow down network performance.
1. Enterprise Mobility
Two things have led to blind spots in enterprise mobility: the huge increase in mobile traffic and the number of new devices that are popping up on the network. The high volume of mobile traffic is a problem, but the bigger problem is the new threat vectors created mobile devices and the fact that many networks cannot or do not monitor their activity.
2. Encrypted traffic
SSL-encrypted traffic makes up a growing portion of all enterprise traffic. NSS Labs has found that SSL encryption is used in 25 to 35 percent enterprise traffic. This number is growing. Although firewalls and other inline devices have SSL support, they are often not able to monitor, perform management, or secure the network at speeds that aren’t detrimental to it.
3. Virtualized Infrastructure is on the Rise
Virtualized infrastructure is more difficult to monitor than physical infrastructure. This problem is exacerbated by its rapid expansion and rapid scaling. It’s easy to see the blind spots created by the SDN frameworks’ adoption and the disruption caused in the data centers.
4. Internet of Things
The Internet of Things allows more devices to connect to networks and they are talking. The Internet of Things is often thought to be smart refrigerators and thermostats. However, in business, especially manufacturing, the Internet of Things could refer to any number of connected devices. Not all devices have the latest and greatest hardware. It can be very difficult to ensure that all devices have been accounted for and are being monitored. It is also difficult to monitor older systems, which are more vulnerable to breaches. For example, SCADA systems in energy.
5. Shadow IT
It’s a simple truth: you can’t protect what you don’t see. Shadow IT is often an unknown entity that enters the enterprise. Shadow IT can be thwarted by better communication between IT departments, line-of-business managers, and IT department. However administrators still need to monitor and manage applications and services.
Source: IT Business Edge