What Security Use Cases Are You Using?
I hear this comment all the time, “Yeah, I have enough security defenses deployed.” However, when I press further to understand what the person is doing, all I typically get is the name of a few security products that are being deployed as point solutions. While it is good to know the name of the products deployed, it is more important to understand the use cases that are being, or not being, addressed. This allows you (and others within your organization) to understand the current state of your security architecture and how it will need to morph in the future.
For instance, most enterprises have hidden network and application vulnerabilities that can have disastrous consequences. To prevent network security breaches, you need to create a robust security and visibility architecture. What this really means is that you need to fully understand the use cases you are deploying to solve your security problems, not what boxes you deployed.
Here is an example of 14 key network security use cases that can help you detect and minimize security threats.
- use data filtering for rapid forensic investigation to limit breach damage
- improve network uptime by using an external bypass switch
- use application intelligence to capture indicators of compromise
- out-of-band data filtering can improve security tool efficiency
- high availability makes inline security tool deployments more reliable
- n+1 redundancy delivers reliability at a fraction of the cost of high availability
- easily enable appliance-based SSL inline decryption with a network packet broker
- simplify inline SSL decryption using a network packet broker with integrated decryption
- deployment of threat intelligence gateways reduces false-positive alerts
- serial tool chaining of suspect data improves the data inspection process
- self-healing inline security architectures maximize network availability
- protect your network with a network packet broker and a honeypot
- save time and money when deploying ASA firewall migrations
- SIEM integrations automate threat detection and mitigation
If you want more details on what these use cases involve, download the whitepaper Ixia’s Guide to Visibility Use Cases - Network Security to get an overview for each of these use cases.
Once you understand these basics, you can download the ebook The Definitive Guide to Visibility Use Cases to get over 60 different example use cases of how you can fully utilize a visibility architecture. These use cases cover various business needs – like removing network blind spots, reducing infrastructure cost, accelerating troubleshooting activities, as well as these 14 use cases on strengthening your security architecture.