sb-eu logo
Story image

Networks shrouded in lack of visibility - SANS Institute report

23 Apr 2020

A new report from the SANS Institute and ExtraHop has found that network visibility – specifically the lack of it – poses a high or very high risk to organisations worldwide – and many are worried about the risks that remote working is bringing to their business.

The 2020 SANS Network Visibility and Threat Detection Survey polled 213 respondents representing organisations with at least 1000 employees.

Of those respondents, more than 64% indicated that they had experienced at least one successful compromise over the last 12 months.

Close to half (44%) of respondents noted that employee desktops, now popular in remote working environments, may be the most likely attack vector. 

“Traditionally this judgment is a smart choice—humans are fallible—and we know attackers frequently target employee workstations as the initial point of entry. Cloud-based systems (40%), on-premises physical servers (35%) and virtual servers (35%) are perceived as the next riskiest groups,” the report notes.

More than half (59%) of respondents believe that a lack of network visibility poses high or very high risks to their organisation. Furthermore, 98% are concerned about their ability to see encrypted traffic – as only 12.4% stated 75-100% of their internal network traffic is encrypted.

More than half of respondents (52%) claim high visibility into traffic entering and leaving their network (north–south traffic), only 17% claim the same level of visibility into traffic moving within their networks (east–west traffic).

“For these organisations, the challenge is being able to see inside traffic to know whether there is a malicious payload in that encrypted data,” the report notes.

Other issues include physical devices – virtualised and physical servers, employer-owned devices, cloud servers, employee mobile devices, and network devices such as routers and firewalls.

Cloud servers and systems were ranked as a security concern for 40% of respondents.

ExtraHop SVP of marketing Bryce Hein says that network visibility has never been more critical.

"Organisations need to be able to see into east-west traffic to identify threats in the growing number of cloud workloads, as well as get visibility into which devices are accessing enterprise resources. The fewer tools, less time, and less friction required to get that visibility, the better.”

"Choose tools that use machine learning to provide improved analytics for access to the right data in less time," says report author Ian Reynolds. "This might assist in meeting staffing concerns and provide faster resolution of unexpected behaviours, threats and incidents."
 

Story image
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."More
Story image
Google and Amazon overtake Apple as most imitated brands - Check Point
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point. More
Story image
Internet outages drastically increased during COVID-19 lockdowns, report finds
Global internet disruptions increased 63% in March, with internet service providers hit the hardest. This is according to the 2020 Internet Performance Report from ThousandEyes, the internet and cloud intelligence company.More
Story image
CrowdStrike uncovers key cybersecurity findings following COVID-19
Businesses around the world see cybersecurity as a top investment following a mass move to remote working, and it is expected that technology budgets will rise despite uncertain economic times.More
Story image
BT launches first in series of managed security services for Microsoft cloud
“BT’s collaboration with Microsoft is expanding further to recognise the combined strength of our security offerings and deliver industry leading solutions for our customers.”More
Story image
Machine identities increasingly exploited, new research finds
Venafi, the provider of machine identity management, finds that malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink.More