Integrated
NetworkSecurity
Strategies
Formoreinformation,pleasevisit:
http://www.cisco.com/go/security
OrganizationsHistoricalApproachtoNetworkSecurity
Thehistoricalbehavioristotreatnetworksecurityasanoverlayoraddressnetwork
securityconcernswithassortedpointtools.
NetworkSecurityChallengesPersist
Thehistoricapproachhasledtoanumberofnetworksecuritychallengesandisno
longeraneffectivestrategyforaddressingadvancedthreatsorITcomplexity.
MostSignificantFactorsthatAreShapingOrganizations’
NetworkSecurityStrategies
Forward-thinkingorganizationsthatarekeepingsecurityrisksinmindplantoaddress
issuesaroundcomplexityscalabilitypolicyenforcementandinefficiencybybuilding
amoredynamicintegratednetworkarchitecture.
Challengesthatlackofintegratednetwork
securitycontributeto:
Significantfactorscitedinclude:
Thesestrategiesinclude:
PrimaryNetworkSecurityStrategyObjectives
Networksecuritystrategiesarechangingasorganizationsbuildnetworksecurity
architecturesthatprovidesecurityefficacyandoperationalefficiencywhile
supportingbusinessrequirements.
oforganizationssaytheir
networkwasnotarchitected
withsecurityinmind
Networksecuritypoliciesandcontrolsarenotcohesiveand
mustbeimplementedacrossdifferenttechnologies.
Malwarethreat
preventionanddetection
31%
51%
Securitystaffistoobusyrespondingtoeventsandnot
enoughtimeisspentwithtrainingplanningandstrategy.
27%
Securitypoliciesaretoocomplextobeenforcedwith
currentnetworksecurityprocessesandcontrols.
26%
Therearetoomanyindependenttools.
26%
52%
Supportformobile
computinginitiatives
46%
Theneedforanintegratedarchitecturewithcentral
commandandcontrolanddistributedpolicyenforcement
48%
Networksecurityflexibilitytosupportdynamic
businessprocesses
43%
Supportforcloud
computinginitiatives
Implementmorestrong
securitycontrolsthroughout
theinternalnetwork.
Automatemanualprocesses.
Capturemorenetwork
trafficforsecurityanalytics.
Consolidatedisparatetools
intointegratedsecurity
platformslikeNGFWs.
Createaspecializedgroupwithboth
networkandsecurityskills.
Applymoregranularnetworkaccess
controlsbaseduponfactorslikeuser
identity,devicetype,andtime.
43%
Theneedtoscalenetworksecurityto
meetincreasingnetworktraffic
36%
Toomanyoverlappingcontrolsandprocesses
tendtocauseproblems.
28%

Integrated Network Security Strategies