Close

After all the Hard Work, Why Does the Security Gap Still Exist?

By Larry Lunetta, VP of Marketing Security Solutions
Share Post

Why is cybersecurity so hard?

We’ve all seen the stats on cybercrime, and the numbers keep ticking upward. More attacks, more data breaches, more business disruption. Organizations are spending hundreds of billions of dollars in cybersecurity, and the problem is getting worse. But still, the good guys keep pushing ahead.

I’ve been in cybersecurity for more two decades, and the answer keeps changing. To understand the current state of the IT security gap, Aruba partnered with the Ponemon Institute to survey 3,866 IT and IT security practitioners in Asia-Pacific, EMEA and North America. This is the first in a series of blogs exploring why it’s so difficult to detect attacks and stop breaches.

The Expanding, Blurring Perimeter is a Big Pain Point

People love their mobile devices and cloud access, but the Ponemon study confirmed the consensus that the attack surface has expanded. In fact, 62 percent of respondents said gaps in their IT infrastructure made it easier to for attackers to penetrate their companies’ defenses.

Fifty-five percent said it’s harder to protect the expanding and blurring IT perimeter with the rise of IoT, BYOD, mobile and cloud. Securing IoT devices is particularly challenging, not only from sheer numbers of devices but also because IoT devices are lightweight and often can’t be protected with traditional endpoint security.

Security teams know that you can’t control what you can’t see. But the reality is that IT lacks visibility into what users and devices are on their networks and what they’re doing. Half of the survey respondents admitted that a lack of visibility into what users and device were doing when connected to the IT infrastructure was the main reason for the security gap.

Compromised users, negligent users and IoT devices were the three big worries when it comes to insider risk. Many breaches involve the theft and misuse of credentials for a mobile device, which often provides privileged access to the enterprise.

Making matters worse, it’s getting harder and harder to find and retain highly skilled cybersecurity pros. Half of the respondents pointed to shortages in IT staffing as the reason for the growing security gap.

Aruba Provides 360-Degrees of Active Protection

At Aruba, we’re working to make cybersecurity less difficult.

Gaining better visibility into what your users and devices are doing on your network is a crucial step to closing the gap. Aruba is delivering that visibility and control through Aruba 360 Secure Fabric, a framework that provides a set of integrated solutions, including Aruba ClearPass and Aruba IntroSpect.

With Aruba, you can use policy-based controls for access and onboarding of mobile and IoT devices from wired and wireless networks. Components of the fabric use machine learning to detect slowly gestating attacks that have eluded traditional defenses, while proactively responding to these advanced cyberattacks across any network infrastructure. Aruba security solutions are open and integrate with more than 140 technology partners to provide an end-to-end solution.

Security is built into the very foundation of Aruba’s wired and wireless infrastructure, with unmatched innovation in the areas of encryption, physical hardening and remote access to ensure that user, system and device traffic can always be trusted.

More on Gaps and Solutions

If you’re interested in learning more about the security gap—and the technologies and processes that security teams rely on in this new threat landscape - download the full research report.

Tags:

  • BYOD
  • ClearPass
  • IntroSpect
  • IoT
  • UEBA