Latin America. Carlos Macías, Country Manager of Citrix Mexico, says that although millions of dollars are currently invested in security solutions, information continues to remain vulnerable as new threat vectors and attacks emerge every day and the number of incidents increases.
The tools and processes that were implemented are often too general in scope and do not adequately prevent today's organizations as the combination of different types of attack can bring down an individual machine, a specific network device, a specific port or service, or even an entire network. The question remains, therefore, how can these types of attacks, in all their forms, be better mitigated?
While IT continues to control the network perimeter and manage many of the enterprise applications, the landscape where you work is evolving and expanding. Now, devices are both enterprise and personal, many users choose cloud-based applications, employees no longer do all the work from company offices, and traditional work hours are a thing of the past. The multiplication of devices, applications and locations, all at the same time, increases the security burden and a new approach must be sought. Contextual security is therefore a prerequisite for workforce mobilization.
This approach combines information security policies, identity management, authentication, data protection, and compliance. All this makes companies implement a proactive approach to safety without compromising the experience or productivity of workers. Instead of giving users a full network access pass all the time, contextual security combines information from "people" and functions: where the person is at a certain time, what kind of device they use and who they are, as well as what kind of information they are trying to access; this enables IT to set policies to manage contextual access to sensitive and restricted data information across all business scenarios.
In addition, the end-to-end visibility into connections, traffic, and user activity provided by contextual security enables IT to address privacy, compliance, and risk management priorities without impacting workforce productivity or workspace transformation initiatives. For example, being designed specifically for digital workspace security, Citrix Analytics offers key insights to prevent and combat the threats that plague businesses these days. The analysis engine offers an autonomous system that continuously monitors users, devices, applications, networks to detect anomalous or malicious behavior. To which we must add that it also offers precise actions to mitigate and prevent them, delivering the safest workspace in the industry.
In conclusion, attacks and attack vectors are becoming very sophisticated and traditional threat detection techniques based on known signatures and patterns will increasingly have a more limited effect. Therefore, organizations need solutions developed based on a holistic and proactive approach, which provides security analysis to combat advanced threats based on monitoring all aspects of user behavior and leveraging advanced machine learning algorithms to distinguish normal employee behavior from that of a malicious attacker. A breakthrough for the benefit of enterprise security, no doubt.
Leave your comment