“Fast cars can go faster if they have good brakes.” Next add the complexities of defending a defined perimeter in the case of your data center, as op- posed to your assets in the cloud. Think defense-in-depth for the perimeter defense and Zero Trust for your cloud security. Zero Trust is based on the premise that all devices on your network are compro- mised. Both of these will be covered in greater detail below. Your general checklist for defense should include risk assessments, incident response plans, DDoS mitigation, endpoint protection, Managed SIEM, and perimeter security. Disaster Recovery-as-a-Ser- vice (DRaaS) is also a critical back up step to support mitigation when a successful attack occurs. You’ll need to set up your infrastructure with role-based access controls that define who gets access to what. Anything sensitive will need to be encrypted, of course. Some people view IT security as an otherwise avoidable (assuming there were no bad guys) pit of time and money that deflects attention from other investments more directly help to build the bottom line. After all, the criminal element should not do this kind of thing. Others take a more optimistic view that, by amping up their security, they can now entrust their IT infrastructure to do things that their competitors would find far too risky to try – assuming, of course that they were using more basic levels of security. To paraphrase one expert: “Fast cars can go faster if they have good brakes.” This highly profound statement is very correct despite its obvious incorrectness. No, the brakes don’t make the car go faster at all. But it sure is easier to hit the gas when you know a good pair of brakes can drop that speed in a hurry, in order to keep you safe. IT security is like that, too. This 6-12 Report will help enterprise decision makers to work more effectively with trusted advisors to get the most out of technology while keeping their data safe. At the end of the day, that’s what it’s all about. Copyright © 2020 ACopyright © 2020 AVVANT CommunicANT Communicaations, Inc.tions, Inc. 45
Managed Security Trends and Insights Page 5 Page 7