Download PDF version Contact company

ExtraHop, a provider of cloud-native network detection and response, announced the results of a SANS Institute survey, Network Visibility and Threat Detection. According to the report, more than 64 percent of respondents reported suffering at least one successful attack within the last year, and 59 percent believe a lack of network visibility poses a high or very high risk to their operations.

Perhaps most concerning in light of the recent large-scale shift to remote work, 44 percent of respondents see employee desktops as the most likely attack vector. As enterprise organisations and government agencies grapple with how to enable, manage, and secure newly distributed remote workforces, network visibility is more critical than ever as they adjust to the new IT reality.

Accessing enterprise resources

The survey exposes key gaps in enterprise security, including that 98 percent of respondents are concerned about their ability to see into encrypted traffic, while over 80 percent identified east-west traffic and network connected devices as areas of opacity. “Having visibility of every device and how they are meant to behave on your network is crucial to understanding what constitutes normal traffic and what could be considered a deviation,” writes survey author Ian Reynolds.

Bryce Hein, SVP of Marketing at ExtraHop, concurs. “At a time when organisations are rapidly transitioning to remote work and cloud usage is surging, network visibility has never been more critical,” said Hein. “Organisations need to be able to see into east-west traffic to identify threats in the growing number of cloud workloads, as well as get visibility into which devices are accessing enterprise resources. The fewer tools, less time, and less friction required to get that visibility, the better.”

Cloud-based systems

In addition to identifying critical gaps in network visibility, key survey findings include:

40 percent of respondents identified cloud-based systems as a potential entry point for malicious actors

Growing complexity within the enterprise environment. Over 93 percent of respondents indicated that they manage more than a thousand endpoints, and almost 90 percent manage between hundreds to thousands of servers. Lack of cloud visibility affects security posture. 40 percent of respondents identified cloud-based systems as a potential entry point for malicious actors.

At the same time, only 17 percent reported high visibility into their lateral communication inside their network (east–west traffic), including all cloud traffic. Need to reduce tool sprawl. The majority of companies use tooling from more than 10 vendors, with nearly one-fifth utilising more than 20.68 percent of respondents expressed a desire to reduce the complexity of their systems by reducing the overall number of tools involved in their operations.

More network visibility

The survey also found that, while organisations want more network visibility, there are operational impediments. Lack of staff (62 percent), lack of time, including having other issues with greater importance, (51 percent) and lack of appropriate skills in the existing staff (46 percent) were the leading concerns.

According to Reynolds, machine learning will play a key role in overcoming these challenges. “Choose tools that use machine learning to provide improved analytics for access to the right data in less time,” he writes. “This might assist in meeting staffing concerns and provide faster resolution of unexpected behaviours, threats and incidents.”

Download PDF version Download PDF version

In case you missed it

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Anviz transforms traditional property management into a smart reality, making digitisation more than just talk
Anviz transforms traditional property management into a smart reality, making digitisation more than just talk

The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart securi...

Quick poll
Which feature is most important in a video surveillance system?