Today's Huge Networks Need Agile Security Tools to Ferret Out Malware

By Wayne Rash  |  Posted 2015-11-17 Print this article Print
Network Security

When Dell decided to start using Cylance on its business and corporate computers, the company discovered while it was doing due diligence that Cylance stopped approximately 99.5 percent of all malware even after Dell's network engineers threw all the malware they could find at it.

Typical antivirus software finds only about one-half to three-quarters of the malware that shows up. Furthermore, the Cylance software runs on nearly any platform, which is another factor that makes the software effective on a wide range of networked computers.

But Cylance isn't the only answer. It only takes a couple of endpoints to get infected with malware to start wreaking havoc widely across a network. This means that in addition to endpoint protection, there needs to be network-based protection as well. Effective network protection requires a variety of hardware- or software-based appliances, including firewalls and intrusion detection systems.

But once malware worms its way into a network, there has to be some kind of system in place to ferret it out and destroy it.

To solve problems that can't be handled on the endpoint, there's cloud-based security software such as Wedge Networks' new Wedge IQ software, which runs in the cloud and can protect networked devices. When I wrote about Wedge a year ago, the product was using a signature-based method of identifying malware. It still does that, but the company is adding predictive analytics to its cloud-based product as well.

This means that Wedge, running in the cloud, can monitor the actions of endpoints on the network for signs of malware. Where once it used to block the actions of malware when it detected its signatures, now it can watch for activity that may be signs of malware before any actual infection takes place. Again, malware may still get into the network, but it won't be able to actually do anything because it will be detected and disabled first.

The scale of growth in network capacity is such that what was once a local or perhaps a limited problem can quickly become global in scale overnight. The vast capacity of these new networks also means that they have become vast doorways that hackers and malware can enter. Because of today's network speeds, bad things can happen almost instantly.

As you might expect, the problem isn't going away. Demand for connectivity of all sorts is not going away either. This means that networks are only going to get bigger and will carry more data at ever higher speeds. Fortunately, security companies and the companies that run these networks understand security problems better than ever. Now all they have to do is keep up.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel