Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    Today’s Huge Networks Need Agile Security Tools to Ferret Out Malware

    By
    Wayne Rash
    -
    November 18, 2015
    Share
    Facebook
    Twitter
    Linkedin
      Network Security 2

      DALLAS—Over the past year it’s safe to say that both metro and global Ethernet are exploding. According to numbers released to the press at the Metro Ethernet Foundation’s GEN15 conference here, wide area versions of Ethernet are showing 100 percent growth year over year.

      Most of the growth is in networks delivering bandwidth of 1 gigabit or greater. In fact, the MEF has already certified six vendors for 100 Gigabit Ethernet, and networks with that bandwidth are already going into place.

      But having all that bandwidth adds to problems in other areas, one of which is security. It’s not that such high speeds change the security landscape, exactly; it’s that security needs to become more sophisticated to keep up. Finding security appliances that will work at 100G bps requires groundbreaking hardware. And that’s only the start.

      With the growth of these massive networks, the complexity changes. A typical metro Ethernet may have to work with different edge vendors. The logical network may have to work across varying Ethernet topographies and different network hardware. Furthermore, it may be connected to a wider global network with access in places that are more risky than in the United States.

      To top it all off, as these networks have grown, different parts will have different management software and, in many cases, different managers. So the question becomes how to keep the network secure from end to end. As you probably suspect by now, there’s also no single solution.

      In fact, to ensure that network security is maintained throughout such large networks, it’s important to have security products that handle the endpoints as well as the network backbone and individual segments.

      For example, Cylance is a security company that’s dealing with the problem of endpoint protection. But because the types of endpoints that exist on such broad network environments vary so widely, the company is building security software that protects everything from workstations and servers to devices on the Internet of things (IoT). Those things may include automotive and aircraft control systems, machines on factory floors, point of sale terminals or devices that provide telemetry.

      According to Cylance Chief Marketing Officer Greg Fitzgerald, the problem of protecting this vast array of devices means that the company has had to develop security software with a very small footprint that is able to run in a wide variety of environments.

      This means that Cylance doesn’t use a signature- or heuristics-based anti-malware program, but rather one that’s based on predictive analytics. This avoids the need for a huge database of signatures and other data, and Cylance contends that makes its system significantly more effective.

      Today’s Huge Networks Need Agile Security Tools to Ferret Out Malware

      When Dell decided to start using Cylance on its business and corporate computers, the company discovered while it was doing due diligence that Cylance stopped approximately 99.5 percent of all malware even after Dell’s network engineers threw all the malware they could find at it.

      Typical antivirus software finds only about one-half to three-quarters of the malware that shows up. Furthermore, the Cylance software runs on nearly any platform, which is another factor that makes the software effective on a wide range of networked computers.

      But Cylance isn’t the only answer. It only takes a couple of endpoints to get infected with malware to start wreaking havoc widely across a network. This means that in addition to endpoint protection, there needs to be network-based protection as well. Effective network protection requires a variety of hardware- or software-based appliances, including firewalls and intrusion detection systems.

      But once malware worms its way into a network, there has to be some kind of system in place to ferret it out and destroy it.

      To solve problems that can’t be handled on the endpoint, there’s cloud-based security software such as Wedge Networks‘ new Wedge IQ software, which runs in the cloud and can protect networked devices. When I wrote about Wedge a year ago, the product was using a signature-based method of identifying malware. It still does that, but the company is adding predictive analytics to its cloud-based product as well.

      This means that Wedge, running in the cloud, can monitor the actions of endpoints on the network for signs of malware. Where once it used to block the actions of malware when it detected its signatures, now it can watch for activity that may be signs of malware before any actual infection takes place. Again, malware may still get into the network, but it won’t be able to actually do anything because it will be detected and disabled first.

      The scale of growth in network capacity is such that what was once a local or perhaps a limited problem can quickly become global in scale overnight. The vast capacity of these new networks also means that they have become vast doorways that hackers and malware can enter. Because of today’s network speeds, bad things can happen almost instantly.

      As you might expect, the problem isn’t going away. Demand for connectivity of all sorts is not going away either. This means that networks are only going to get bigger and will carry more data at ever higher speeds. Fortunately, security companies and the companies that run these networks understand security problems better than ever. Now all they have to do is keep up.

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×