Uploaded on Sep 1, 2022
PPT on cybersecurity mesh.
What is cybersecurity mesh and how can it help you?
What is cybersecurity mesh and how can it help you? Introduction The concept of cybersecurity mesh could help solve and simplify issues created by multi-cloud deployments and the increase in remote work environments. 8 / 0 5 / 2 0 XX 2 S O U R C E : W W W. T E C H T A R G E T. C O M What is cybersecurity mesh? Cybersecurity mesh architecture (CSMA) is an architectural approach rather than a specific technology or market segment. It is a similar concept to zero trust. However, while zero trust presupposes that every device in an ecosystem is already compromised and potentially hostile, CSMA sees environments as disparate, logically separated and heterogeneous. 8 / 0 5 / 2 0 XX 3 S O U R C E : W W W. T E C H T A R G E T. C O M Four distinct layers 1. security analytics and intelligence 2. distributed identity fabric 3. consolidated policy and posture management 4. consolidated dashboards 8 / 0 5 / 2 0 XX 4 S O U R C E : W W W. T E C H T A R G E T. C O M Short-term effects of cybersecurity mesh Practical-minded practitioners might be asking how all of this changes their day-to- day lives. The answer is that it doesn't at least not directly or in the short term. 8 / 0 5 / 2 0 XX 5 S O U R C E : W W W. T E C H T A R G E T. C O M Long-term effects of cybersecurity mesh 1. Philosophical shifts sometimes drive the market, and the market, in turn, influences real-life architectures. 2. Industry acceptance makes it easier to incorporate the concept into architectural approaches. 3. It helps drive interoperability. 8 / 0 5 / 2 0 XX 6 S O U R C E : W W W. T E C H T A R G E T. C O M Why Enterprises Need Cybersecurity Mesh? Cybersecurity mesh is the most practical and adaptable approach for dealing with these threats in an enterprise-level organization. It extends security across your entire architecture, making it possible to secure all systems and points of access with a single, unified set of technologies. Further, because it is driven by the most recent threat intelligence, a cybersecurity mesh can evolve as new threats emerge. 8 / 0 5 / 2 0 XX 7 S O U R C E : W W W. F O R T I N E T. C O M Applications of Cybersecurity Mesh 1. Prepare for the future. Your organization can be positioned to respond to future security risks by selecting cybersecurity technologies that facilitate integration. For example, there are plug-in application programming interfaces (APIs) that allow customization and extensions, as well as extensible analytics. 8 / 0 5 / 2 0 XX 8 S O U R C E : W W W. F O R T I N E T. C O M Applications of Cybersecurity Mesh cont. 1. Close the gaps. Using current and emerging security standards, you can close any security gaps due to weaknesses and vulnerabilities in different solutions. 8 / 0 5 / 2 0 XX 9 S O U R C E : W W W. F O R T I N E T. C O M Key Considerations When Adopting Cybersecurity Mesh 1. Vulnerability: There has been a 600% increase in phishing schemes over the past couple of years, and ransomware attacks occur every 11 seconds. This exposes the reality that current IT systems are vulnerable. In addition to existing vulnerabilities, there is the threat of a zero-day attack, an attack by a method previously unknown. 8 / 0 5 / 2 0 XX 1 0 S O U R C E : W W W. F O R T I N E T. C O M Key Considerations When Adopting Cybersecurity Mesh cont. 1. Cost: The cost of ransomware attacks alone is about $6 trillion annually, and the cost of cybercrime attacks is on the rise at about 15% per year. Digital transformation incurs its own cost, too, especially if an organization’s infrastructure or architecture has to be redesigned. 8 / 0 5 / 2 0 XX 1 1 S O U R C E : W W W. F O R T I N E T. C O M
Comments