Menu
Legacy network security proves costly: Palo Alto

Legacy network security proves costly: Palo Alto

Advanced threats can’t be effectively addressed using a ‘set it and forget it’ approach

Outdated IT network security systems and a lack of collaboration are contributing to unnecessary and costly manual incident responses to advanced threats.

Palo Alto Networks systems engineering manager A/NZ Gavin Coulthard said one of the most consistently neglected costs of any security product is neither the price nor maintenance, but the time and talent required from security experts.

“Cybersecurity architects and managers need to recognise the dramatically diminished effectiveness of legacy network security solutions that continue to rely on methods and technologies designed for the threats of yesterday,” he said.

“Advanced cyber threats simply can’t be effectively addressed using a ‘set it and forget it’ approach to security.

“Worse still, the vast majority of security products focused on advanced threats stop at detecting a threat, which kicks off an incident response phase.

Coulthard said modern IT incident response required a set of highly technical skills including advanced traffic analysis, memory forensics and reverse engineering of malware - highly technical disciplines.

“An enterprise would be lucky to have just one of these experts on staff,” he said.

“The fundamental problem is that advanced threats are not sufficiently rare.”

He said the IT security industry and organisations needed to grow to a place where incident response is reserved for the truly exceptional threats, not those that simply slide through outdated security models invented a generation ago.

In order for this to happen the industry needs better and faster sharing of threat intelligence to create a shared level of protection.

It also need a more automated approach to investigate threat events, avoiding deep-dive technical analysis.

However, Coulthard said, understandably, many organisations were reluctant to share what they found about advanced cyber threats on their networks.

“Some may see knowing how to combat an advanced threat as a competitive advantage while others may see sharing the information as drawing unwanted attention to their network’s vulnerabilities,” he said.

“The important thing to remember is this: until there is a more collaborative approach to threat identification and mitigation, combined with an automated approach to investigating threat events, Australian organisations will continue to suffer from the adverse effects of advanced cyber threats.

“It’s only when these two elements come together in a more mature approach that we will be able to minimise the amount of human intervention required and thereby reduce costs.”

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags palo alto networksPalo AltosecurityPalo Alto Networks manager systems engineering A/NZ Gavin Coulthard

Upcoming

Slideshows

In Pictures: Houston, we have a bug - 9 famous software glitches in space

In Pictures: Houston, we have a bug - 9 famous software glitches in space

There’s never a good time to run into software bugs, but some times are worse than others - like during a mission to space. Spacecraft of all shapes and sizes rely heavily on software to complete their objectives. But those missions can be quickly ended by the simplest of human errors when writing code. The omission of an overbar here or overflow error checking code there can mean the difference between success or failure, not to mention the loss of hundreds of millions of dollars, years of work and, on manned missions, human life. Use the arrows above to read about 9 examples that show that, despite the care with which these systems are built, bugs have occurred in spacecraft software since we started to fling rockets into space - and will, no doubt, continue to crop up.

In Pictures: Houston, we have a bug - 9 famous software glitches in space
IN PICTURES: Windows 10 Sydney launch

IN PICTURES: Windows 10 Sydney launch

Tech lovers and party-goers alike headed down to Mrs Macquarie's Chair to be part of the world-first Windows 10 Launch Party. The night featured a presentation by Microsoft Australia managing director, Pip Marlow, DJs, live demonstrations and digital artistry by Lister.

IN PICTURES: Windows 10 Sydney launch

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments