Within the Internet ecosystem there are various organizations that have responsibility for different parts, like the protocols and standards that enable basic end-to-end communications (such as the Internet Protocol); the resources that direct these communications (such as IP addresses and the Domain Name System) and so on. Each organization has a specific role and provides fundamental value to the overall functioning of the Internet.
These technologies, resources and services are all highly interdependent and require a significant amount of coordination. The same thing applies when it comes to security. Or rather, should apply.
Real security is not something you can have just by putting up an “eggshell” protection around your data, setting out guards at the points you think are the most vulnerable. Ultimately, your individual security is not just a matter of your ‘individual security’, especially when choosing a multi-cloud strategy that has more and more data sources outside your little eggshell.
You have to start thinking outside of the perimeter-protection and the eggshell-mentality, and instead embrace the ecosystem-mindset.
A security ecosystem is based on cooperation within the industry. Everyone has their own data they need to protect but if you can find a way to cooperate with others and work more holistically with several security sources as the basis, you will be able to build much better protection all together.
What if all the security products on the network could seamlessly and automatically share data with each other, and also glean contextual data from the network to be better informed and to take action more easily and quickly?
As a starting point, we at Infoblox have put a lot of focus in and around integration to be able to play our part in a security ecosystem. We are the market leader in network control services, specifically DNS, DHCP and IP address management (DDI) solutions, and we provide rich contextual data to multiple security, incident response, and compliance solutions.
One of our goals was to become to security what we are to the network; an automation company (security automation), to save time. Time is the most critical factor in incident response, before or after a system has been compromised.
It is immensely beneficial to be sharing the data gleaned from different unique vantage points in the network with IT security and network teams so they can be more informed and less dependent on each other – again saving time and being more productive.
It’s time to crack the egg and start thinking about ecosystem and security by design.