How to Choose Security Technology That Works – CSO Online

By Juniper Networks
Learn how a Zero Trust framework in your data center architecture protects data and applications across physical data centers, private clouds, and public cloud environments simultaneously.
The role of a security practitioner is difficult. From operational workflow changes to accommodating the latest application requirement impacting policies, it’s a relentless wave of actions to ensure that users, environments, and data are protected as effectively as possible. After all, that’s management of the attack surface.
This role becomes even more daunting when selecting a new technology to deploy in your network environment. If every product and technology your organization considered worked equally well, choosing a new technology would be more straightforward. However, some technology decisions are made based on too few data points, too little input, and, worst of all, no definitive proof that this thing you are buying works as promised.
It is essential to leverage third-party testing houses that leverage real-world use case-based tests designed to show the effectiveness of the products under consideration. This objective testing is a vital component of the evaluation process, giving you unbiased data to help you make an informed decision. Would you buy a car without taking it for a test drive? Absolutely not, and fortunately there are resources that can help you avoid making an analogous mistake in selecting effective security technology.
What does Security Efficacy mean?
To truly understand the value of security efficacy, we must start by understanding the vernacular. In the context of security testing, efficacy is the ability for a technology to accurately detect and mitigate threats while simultaneously performing its infrastructure role. That may sound like a lot, but it’s easy to break down:
Two established organizations that do this are Mitre and CyberRatings. While Mitre focuses its tests principally on the endpoint, CyberRatings, formerly NSS Labs, specializes in assessing security technology across critical capabilities, including efficacy, management, and costs. CyberRatings recently conducted and released results for their Cloud Network Firewalls test, with many notable network security vendors submitting their virtual firewall solutions to be tested against various stress factors from performance to efficacy. This data was also coupled with a cost model based on the configuration of the AWS instances commonly used by customers. The result: a compelling cost and efficacy model to assist in qualifying the selection of a virtual firewall.
Once the efficacy is known for the tested technology, the next step in the consideration process is suitability. I recommend investigating other factors to ensure that the right decision is made, including:
Want to learn more? Check out this Example report from CyberRatings on their most recent Cloud Network Firewalls test of Juniper’s vSRX virtual firewall.
 
 
Copyright © 2022 IDG Communications, Inc.
Copyright © 2022 IDG Communications, Inc.

source

Post expires at 4:22am on Friday March 17th, 2023

Leave a Reply

Next Post

GTA 5 Source Code Leaked Online - EarlyGame

Sat Dec 17 , 2022
Parts of the GTA 5 source code were stolen and leaked online. What happened and what does this mean for the game?Remember when Rockstar Games was hacked? This obviously lead to the infamous GTA 6 leaks, but it was also alleged that the company had other resources stolen, including code. […]

You May Like

%d bloggers like this: