Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Views on application security

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

We are a product company of cyber threat platform. Use cases come from our work. We promote intelligent trust and validation to counter emerging threats. Do you know your brand? Do you have the appropriate level of monitoring to prevent threats? How quickly can you extract information and make it resistant to imminent attacks?

Currently, sensitive data systems that are not properly protected include:

Self-developed and proprietary system production server key IT infrastructure: hypervisor, DC,IaaS, network equipment financial system: SWIFT,PCI-DSS CDE environment Healthcare system: EMR / HER,PACS, medical device database and file sharing SCADA,IIoT and IoT devices and more

The standard for most enterprises is to use VPN and direct links. This has been around for 20 years, but it can cost a lot of money to implement it effectively. We create highly available solutions to protect data. We move the VPN stack and make it cheaper. This is a more cost-effective and secure solution. Moving the stack closer reduces costs. VPN routers can be expensive. We don't need hardware; we turn it into a software stack. Scale up or out in the software stack. Turn your merchandise server in your own router to get closer to your environment and data.

GDPR

In Europe, around GDPR, we help our customers delete 70% of their documents using data catalogs because they are out of date. This greatly reduces the risk. We are an information hoarder society. Most companies have been storing information for years. We collect information and never clean it up. To clean up hoarding, you need to discard items, store items securely, and identify high-value and high-risk data and documents in order to create orders in chaos.

The biggest use case, of course, is the impact of the European Commission (EC) Directive 2016Uni679 General data Protection Regulation (GDPR), which enforces detailed knowledge of the security status of the data.

Internal threat

We did catch malicious and reluctant insiders.

People are not always malicious. Just carelessness or lack of understanding of policy.

In many cases, we can detect vulnerabilities that have not been discovered for a period of time, prove the cause of the vulnerabilities, and determine the damage caused. A considerable number of people do not mean that it is bad, but it does not achieve good safety and health. Technology helps businesses stay healthy by identifying problems and users. Detect violations and correct them as soon as possible. If you do not have the appropriate policy, you cannot detect an exception. A customer asked to detect leaks in his network. We asked, "what is allowed and what can employees do with the data?" There are no restrictions on email, downloads and cloud use. You need basic security policies and procedures so that users can monitor and prevent malicious activity.

DevOps

Some of the most important use cases that CISO / CSO focuses on are multi-cloud security, API security, DevSecOps,SecOps automation, and EDR.

The classic and most common is to use the adaptive pipeline function to put the new scanning technology into the DevOps pipeline. It used to take a year. However, the process has been modified to accommodate the new tool. When the client has a software pipeline, the phase of adding a scanning container should not take several hours. You need to know what you have in production. Software pipeline automata should give you an in-depth understanding of this. To deal with hundreds or thousands of dependencies, you need to know what you have and what you are running. You must know your bill of materials in order to know if you are vulnerable.

APIs

We are seeing organizations rapidly deploy (or want to deploy) new applications that provide better functionality to customers in customer-facing applications, portals, and API-based services. For any business-critical, financial or compliance-driven use case, these need to be protected, and that's where we help.

Other

We help our customers in an all-round way, and we try to get them to implement vulnerability management programs, which is the only way for them to protect themselves. The area of security is growing rapidly, and we work with them to run scans weekly or monthly, and to be able to scan during normal working hours (daylight scanning time), so you can quickly identify and fix problems without slowing down your business. In a perfect world, you would run scans every week.

We are a product company of cyber threat platform. Use cases come from our work. We promote intelligent trust and validation to counter emerging threats. Do you know your brand? Do you have the appropriate level of monitoring to prevent threats? How quickly can you extract information and make it resistant to imminent attacks?

We keep hearing "the perimeter is dead." But that doesn't mean companies should consider deploying systems designed to enter the perimeter without a perimeter. Modern security systems designed to be secure in a non-perimeter environment (for example, Apple's iOS) are deployed as services with automatic updates and significant investment in design security, vulnerability discovery, disclosure and remediation. If the supplier of the system does not provide services to maintain a system that is always up-to-date, then do not put it on the Internet; put it on the outside. At the same time of growing awareness, we still see that enterprises ignore the security associated with embedded / headless / Internet of things devices and systems.

Internet of things cameras have been compromised (such as Nest baby monitor kidnapping threats, other Nest hacking attacks). Malware moves sideways through the network and endangers home computers. We prevent this from happening. We have also enabled parental control-security vulnerabilities that keep children away from Internet access and inappropriate content. In addition to connecting home management, it also allows users to manage their connected home devices and optimize Wi-Fi performance.

Some customers have fragmented application security testing programs. Internally developed applications are managed in different repositories compared to the business applications managed in other inventory lists. Consistent risk management practices are required to integrate all applications and identify SLA to ensure that they are all implemented in the application stack. We help customers implement overall, comprehensive application measures, from risk analysis to remediation, throughout the software stack. We set up a rule-based trouble ticket creation mechanism to create trouble tickets consistently according to rules and policies and roll them out to external ITSM systems such as ServiceNow or JIRA for lifecycle management. Comprehensive risk management, from end to end-identification, prioritization, remediation, reporting.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report