Almost every type of cybersecurity program these days does some sort of scanning, sandboxing or traffic examination to look for anomalies that might indicate the presence of malware. We’ve even reviewed dedicated threat-hunting toolsets whose sole purpose is to enable analysts to ferret out advanced threats which are already active inside a network. All of those types of defenses are necessary to protect any modern network, and that fact won’t change anytime soon.
However, what if there was a different way to look at and enhance security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? If every process, application and workflow needed to conduct business could be defined, then by default everything outside of those definitions could be flagged as illegal. At the very least, critical programs could be identified and all interactions with them could be tightly defined and monitored. It’s a different way of looking at security, called segmentation.
It’s what vArmour does for networks, and the focus of our extensive testing. Read all about how segmentation security went toe to toe against the most modern threats in Network World.