Why Isolated Security Fails
Posted: Thu Feb 06, 2025 9:15 am
That's why security and IT Ops teams must work together to achieve cyber resilience and more.
I've worked with several clients whose security teams were suddenly faced with a full-scale security audit. Why? Their auditor found systems on the network, and even entire network segments, that hadn't been taken under control. As a result, they essentially spent additional cycles on mitigation, which they couldn't afford.
Auditing is a good exercise, but IT departments already have comprehensive discovery tools that work well and focus not just on device discovery but also on service discovery—in other words, on identifying the relationships between the components that make up a service.
Why doesn't security simply use these tools, or better yet, create a practice where IT and security can use the same technologies and processes and make decisions together? IT practices have been well-established and refined since the early days of service management, and security teams are missing out by ignoring the detection systems that already exist.
Getting security and IT to work together successfully malta mobile database time and training, but the result is a more complete and accurate picture of the application and infrastructure components and the business services they provide.
Even co-location of employees is becoming easier, saving time and money because not only are processes integrated, but the actual impact of security on the business is known – something most security operations centers are still struggling to cope with.
How automation can make problems worse
Automation is used in enterprises as a way to manage SOAR . Finding qualified security professionals is difficult, and automation is one of the tools that organizations use to reduce the staffing burden.
I've worked with several clients whose security teams were suddenly faced with a full-scale security audit. Why? Their auditor found systems on the network, and even entire network segments, that hadn't been taken under control. As a result, they essentially spent additional cycles on mitigation, which they couldn't afford.
Auditing is a good exercise, but IT departments already have comprehensive discovery tools that work well and focus not just on device discovery but also on service discovery—in other words, on identifying the relationships between the components that make up a service.
Why doesn't security simply use these tools, or better yet, create a practice where IT and security can use the same technologies and processes and make decisions together? IT practices have been well-established and refined since the early days of service management, and security teams are missing out by ignoring the detection systems that already exist.
Getting security and IT to work together successfully malta mobile database time and training, but the result is a more complete and accurate picture of the application and infrastructure components and the business services they provide.
Even co-location of employees is becoming easier, saving time and money because not only are processes integrated, but the actual impact of security on the business is known – something most security operations centers are still struggling to cope with.
How automation can make problems worse
Automation is used in enterprises as a way to manage SOAR . Finding qualified security professionals is difficult, and automation is one of the tools that organizations use to reduce the staffing burden.