{"id":5942,"date":"2014-06-25T15:00:02","date_gmt":"2014-06-25T22:00:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5942"},"modified":"2014-06-25T13:42:45","modified_gmt":"2014-06-25T20:42:45","slug":"remediation-fear-answer-everything-really","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/06\/remediation-fear-answer-everything-really\/","title":{"rendered":"Remediation and Fear Are the Answer for Everything? Really?"},"content":{"rendered":"<p>Is it just me, or has the cybersecurity community really confused the issue by calling everything \"APT\" these days?<\/p>\n<p>No question APTs are serious business. But almost every article has this undertone of fear that basically says remediation is the answer for everything.\u00a0In all honesty, I stopped watching Seinfeld on Crackle (which is awesome!) because I get so much humor from the cybersecurity articles I'm reading.\u00a0When I stop laughing, though, I find them seriously unfortunate and awkward based on the advice they\u2019re offering CIOs and CISOs.<\/p>\n<p>There\u2019s a segment of the cybersecurity community that wants you to believe the following:<!--more--><\/p>\n<ol>\n<li>You are a bad leader<\/li>\n<li>Your organization is riddled with governance failure<\/li>\n<li>There are too many bugs in applications<\/li>\n<li>There is an insurmountable security gap<\/li>\n<li>You need to hire an army of PhDs to run complicated systems<\/li>\n<li>Attacks are all \"APT\"<\/li>\n<\/ol>\n<p>Are you kidding me?\u00a0Is this World War Z?\u00a0Do I hear Private Joker saying, \"Is that you John Wayne?\u00a0Is this me?\"<\/p>\n<p>Many IT and security professionals are in jeopardy of losing their reputations and jobs not because they lack skills but because entrenched cybersecurity companies are dropping the ball when it comes to helping them protect their assets.<\/p>\n<p>Whenever you see so much fear being peddled, it\u2019s usually an indicator that industry vendors are struggling to evolve and innovate. What these fear mongers forget is that a FUD message alienates CIOs and CISOs from the rest of the C-suite.\u00a0Fear \u2013 of \u201cAPT\u201d, of anything \u2013\u00a0does nothing to show how the IT and cybersecurity community is working to solve problems, so CIOs and CISOs become integral to the growth of the business, like other C-suite roles.<\/p>\n<h3>Prevention vs. Remediation<\/h3>\n<p>Why are many cybersecurity companies emphasizing remediation over prevention? I don't want to take away the importance of remediation, but let's keep the argument in the right context.<\/p>\n<p>When we talk about remediation, what we\u2019re really talking about is incident response. Incident response and many of the current approaches to cyber intelligence are exceptional at telling you what happened after the fact.\u00a0 In other words, the emphasis is on understanding how the robber got in and what they stole after the damage was done.<\/p>\n<p>But this approach means increased cost and complexity when companies need agility and flexibility to survive in today's economy.\u00a0I have a lot of respect for how far the IR community has taken IT and the cybersecurity industry, but far too many cybersecurity companies use the outstanding work of talented IR teams as a crutch. IR and remediation capabilities simply aren\u2019t enough, which is why the Palo Alto Networks platform covers both detection and prevention.<\/p>\n<p>Our approach to threat prevention extends from our application intelligence and control technology. The <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/threat-prevention.html\" target=\"_blank\">intelligence emphasis we put into evasive applications<\/a> across all active network traffic has allowed us to create a highly effective threat prevention platform.<\/p>\n<p>If you want payload analysis over all network traffic, applications and encryption, for example, just turn on that feature.\u00a0If you want to extend your existing threat prevention and application and user policies to mobile or virtualized cloud environments, use one platform to do it.\u00a0And the technology acquired through <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/03\/cyvera-morta-acquisitions-mean-palo-alto-networks\/\" target=\"_blank\">our recent acquisition of Cyvera<\/a> allows us to extend everything we do in active network traffic all the way to active memory in endpoints.<\/p>\n<p>We are everywhere across your network traffic, endpoint memory and virtualized cloud.\u00a0Our platform:<\/p>\n<ul>\n<li>Knows what applications your organization uses<\/li>\n<li>Knows what users are using those applications<\/li>\n<li>Knows when your users are mobile<\/li>\n<li>Natively, controls what applications users can access and when<\/li>\n<li>Knows when users try to access applications that are not authorized<\/li>\n<li>Prevents attacks and immediately knows what user is being attacked<\/li>\n<\/ul>\n<p>Let\u2019s leave behind all that fear messaging and talk about how a real platform approach can work for all of us.<\/p>\n<h3>For more<\/h3>\n<ul>\n<li>Explore our <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/threat-prevention.html\" target=\"_blank\">our Threat Prevention resource page<\/a><\/li>\n<li>Check out the<a href=\"http:\/\/connect.paloaltonetworks.com\/cdr2014\" target=\"_blank\">\u00a02014 CyberEdge Threat Defense Report<\/a>\u00a0to hear insights from hundreds of security decision makers<\/li>\n<li>Palo Alto Networks CSO\u00a0<a title=\"Gartner Summit: Building a Cyber Intelligence Team\" href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/gartner-summit-building-cyber-intelligence-team\/\" target=\"_blank\">Rick Howard\u00a0covered building a threat intelligence team\u00a0at the 2014 Gartner Security and Rick Management Summit<\/a><\/li>\n<li>Explore our\u00a0<a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\">2014 Application Usage and Threat Report<\/a>, including interactive visualizations and a video with key findings<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Is it just me, or has the cybersecurity community really confused the issue by calling everything \"APT\" these days? No question APTs are serious business. But almost every article has this undertone &hellip;<\/p>\n","protected":false},"author":71,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,155,108],"tags":[197,382,532,216,533],"coauthors":[],"class_list":["post-5942","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cybersecurity-2","category-threat-prevention-2","tag-apts","tag-cyvera","tag-endpoint","tag-platform","tag-virtualized-cloud"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5942"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions"}],"predecessor-version":[{"id":5955,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions\/5955"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5942"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}