The Network Doesn’t Lie

Abril 2, 2015

The Network Doesn’t LieIn his March 26, 2015 Network World opinion piece, In Cybersecurity, the Network Doesn’t Lie, Jon Oltsik, principal analyst with Enterprise Strategy Group (ESG) outlines some of the reasons why security professionals are increasingly turning to continuous network monitoring to enhance cybersecurity.

Oltsik begins with some numbers from an ESG Group survey report, in which 40% of respondents claim they plan to move toward continuous monitoring of all assets on the network, while 30% plan to capture more network traffic for security analytics.

While gaining comprehensive network visibility is critically important, it’s also just a piece of what’s required for a truly effective continuous network monitoring solution

Contrast the ESG findings with the recently released 2015 Cyberthreat Defense Report from the CyberEdge Group. In this report, 32% of respondents are already using continuous monitoring for network asset discovery, and 62% indicated their organizations have implemented continuous monitoring (either alone or in conjunction with periodic, ad hoc scanning/monitoring).

So, why are organizations pursuing continuous network monitoring? Oltsik suggests:

As the old network security adage states, “the network doesn’t lie.” Yes, networks may hold secrets within encrypted traffic, but network traffic analysis can inevitably expose the Tactics, Techniques, and Procedures (TTPs) used in cyberattacks.

Along with secrets held in encrypted traffic, with growing use of the cloud, mobile and virtual systems, many organizations are challenged to get a comprehensive and continuous view of all their IT assets. And while gaining comprehensive network visibility is critically important, it’s also just a piece of what’s required for a truly effective continuous network monitoring solution.

Do you need continuous network monitoring?

We could answer the above question by asking whether you need to continuously identify vulnerabilities, reduce risk and ensure compliance with security regulations and policies. Instead, we recommend that you read the Definitive Guide to Continuous Network Monitoring.

It’s a quick, but detailed read that will get you up to speed on:

  • Why there is a growing interest in continuous network monitoring
  • How continuous network monitoring works, and
  • What’s required to implement continuous network monitoring

If you’re attending RSA, you can get a printed paperback edition of the Definitive Guide by visiting Tenable’s booth #N3228. (You can check out our entire RSA schedule here.)

You can also download a copy of the Definitive Guide to Continuous Network Monitoring ebook.

A network security tell-all

For additional insight into continuous network monitoring, register for our April 16, 2015 webinar featuring Steve Piper, author of the Definitive Guide to Continuous Network Monitoring, and Narayan Makaram, Sr. Product Marketing Manager with Tenable. During this 2 pm ET session titled, Measure and Demonstrate Security Effectiveness with Continuous Network Monitoring, we will explain, among other things, how continuous network monitoring can help you answer the $1B question: “What is our risk?” We’ll also provide an overview of Tenable’s SecurityCenter Continuous View 5.0 and answer your questions.