sb-nz logo
Story image

Five ways you can establish robust security architecture

Ixia claims that organisations planning to upgrade or migrate to next-generation firewalls have a great opportunity to gain richer functionality and a wide range of protections.

The security solutions company says that right now is an excellent time for a business to review its security structure to ensure it maximises the value and efficiency of all security devices.

Jeff Harris, VP, Solutions Marketing of Ixia, says that prevention is always better than cure, but that’s not always the case.

“Too many organisations rely on security measures that only kick in after an attack has successfully breached their architecture. Instead, they should focus their security efforts on finding ways to prevent attacks from happening at all,” says Harris.

“This prevents costly downtime and keeps the organisation running efficiently.” 

According to Ixia, there are five key actions that organisations can review to ensure their security architecture maximises protection and efficiency:  1. Scan for potential points of failure to reduce the risk of downtime  Businesses should examine their overall architecture and identify potential points of failure or performance issues. It’s important to avoid serial inline deployment, where traffic is passed from one security appliance to another. A failure in any single device could stop traffic flow and cause a network outage. 

2. Implement efficient load balancing  Pairing the bypass switch with a network packet broker (NPB) lets security staff see and inspect network packets, and route them only to the appropriate appliances. This intelligence-based traffic balancing reduces the unnecessary processing burden on individual appliances, making them more efficient and less likely to fail. 

3. Construct smart security configurations for high availability  Bypass switches and NPBs must be configured for optimum availability, which delivers high availability during normal operations while fully protecting traffic if and when a device goes down.  4. Use filtering tools to improve network visibility  Visibility is crucial within the network to minimise blind spots. NPBs provide a comprehensive view of the network environment, capturing and aggregating traffic, eliminating data duplication, and stripping away unnecessary detail. They can also pre-filter known bad traffic, so security staff can make intelligent decisions about what traffic to block.  5. Future proof the security architecture  Future-proofing security architecture with high-speed bypass switches and powerful NPBs will eliminate network downtime caused by unplanned device failure, deployments, maintenance, or upgrades. It also lets businesses maximise uptime for security infrastructure, reducing the load on security appliances and extending their lifespans, while generating efficient traffic analysis. 

Harris adds that it can be difficult for organisations to determine what the right architecture looks like, and how they should go about building it into their network.

“These five key actions will help IT professionals in organisations ensure the security architecture maximises the company’s overall security and its efficiency,” says Harris.

"Prevention is better, and cheaper, than a cure. Particularly when it concerns the organisation’s security.”

Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Video: 10 Minute IT Jams - Who is Vectra AI?
Today, Techday spoke with Vectra AI head of security engineering Chris Fisher, who discusses the company's key products and offerings, updates on its operations in the A/NZ region, and the latest improvements on its products.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Download image
Equinix study: Firms turn to NFV to support distributed networks
Decision-makers looking for a solution that virtualises a wide range of network functions should evaluate NFV, study finds.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More