Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Listed: All the MVNOs in South Africa – 2025 edition

      19 June 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      19 June 2025

      WhatsApp founders hated ads – Meta is adding them anyway

      19 June 2025

      China’s car factories run cold as price war masks deep overcapacity

      19 June 2025

      Yellow Card, Visa in deal to hasten stablecoin uptake in Africa

      19 June 2025
    • World

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025

      Yahoo tries to make its mail service relevant again

      13 June 2025
    • In-depth

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025
    • TCS

      TCS+ | AfriGIS’s Helen Hulett on how tech can help resolve South Africa’s water crisis

      18 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025
    • Opinion

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » How network visibility and context simplify cybersecurity management

    How network visibility and context simplify cybersecurity management

    By Skybox Security21 May 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    There’s a common thread that connects most organisations that suffer security breaches: they lack total network visibility. Large, enterprise estates are comprised of several disparate network elements, including on-premise, operational technology, cloud and virtual networks. These hybrid environments are rife with process disconnect and have a number of dangerous blind spots.

    Without full network visibility, security teams do not know what they are supposed to remediate or protect, which greatly increases the complexity of their workloads. As cybersecurity needs evolve and pressures placed on chief information security officers and their teams increase, the need for visibility and insight that’s informed by internal and external threat context has become painfully obvious.

    Why network visibility and context are key

    Disconnected processes are a leading cause of security errors. The potential for process disconnect increases within large, hybrid environments. This is primarily because separate teams are put in charge of different areas of the network. An increasing number of workplaces have security teams managing one network area, operations a second and DevOps/DevSecOps a third. These silos make it easy for mistakes to slip through the net.

    Although each team has its specific function, the processes involved in their day-to-day tasks still need to point towards a common goal. DevSecOps teams may have procedures for “security in code” but any changes to services could impact compliance status and will need to be monitored for how their risk status may alter. This is why it’s so important to have complete network visibility. Without it, organisations are unable to identify and analyse their vulnerabilities. But with visibility, the CISO can break down operational silos and gain a true understanding of all ingress and egress points within their environment that will inform their ongoing strategies.

    However, in isolation, full network visibility is only peripherally useful. While it’s great for organisations to be able to identify all of their vulnerabilities and assets, visibility by itself doesn’t inform strategy. This requires context: they need to know how exposed each vulnerability and asset is so that they can remediate the right vulnerabilities first. With this knowledge, security teams are able to eliminate guesswork, develop greater focus, and gain certainty that they can defend their assets and work to reduce the size of their attack surface.

    Barriers to achieving total network visibility

    Of course, gaining context-informed network visibility is easier said than done. Businesses have already made a number of significant investments in scanner technology so that they can identify vulnerabilities within their environment. But the traditional “scan-and-patch” approach to vulnerability management doesn’t cut it anymore. There are too many blind spots missed by scanners, too much time is taken between each scan, and too many network areas (including operational technology devices) cannot be touched by scanners.

    This isn’t to say that scanners are no longer of any use. They are still invaluable as part of a robust cybersecurity management programme that also includes scanless assessments. Data collected by scanners can be normalised and merged with other data sources to deliver an accurate and continuously updated vulnerability record.

    Adding that additional layer of insight – understanding vulnerability and asset exposure – is easier than you might think. And any initial effort and resource dedicated to creating this deeper level of understanding will prove worthwhile when security teams can access a more nuanced understanding of which vulnerabilities within their environment pose the greatest risk.

    The importance of understanding exposure

    In the recently published Vulnerability and Threat Trends Report 2020, it was revealed that vulnerabilities with a medium-severity CVSS score now account for 40% of all new reports. This percentage share is an increase on last year when medium vulnerabilities represented 34% of the total.

    Organisations depend on CVSS scores to determine their remediation strategies; if they see that they have critical – or high – severity vulnerabilities within their infrastructure, they will instinctively choose to remediate these before any medium-severity flaws. But a medium-severity CVSS score does not equate to medium risk. An increasing mass of medium-severity flaws can sit unpatched within an organisation’s environment for a long period; attackers know this, which is why medium-severity vulnerabilities are so attractive to them.

    Organisations lack the resources required to remediate every single medium-severity vulnerability on top of all critical- and high-severity flaws

    This puts organisations in a difficult position. They lack the resources required to remediate every single medium-severity vulnerability on top of all critical- and high-severity flaws. But if they understand which vulnerabilities are most exposed, regardless of their severity level, then they can ensure that they are patched in time. Insight into exposure empowers security teams to create focused remediation strategies that will greatly limit opportunities for attackers.

    Achieving context-rich network visibility has become a must-have. Hybrid security environments are only going to become more fragmented and the attack surface will continue to expand – just look at how most office-based organisations had to contend with a growing network perimeter when all employees started working remotely during the Covid-19 crisis as one example of how unpredictable the pressures placed on security teams can be. To avoid breaches, gain control, simplify cybersecurity management and be in a position to secure digital transformation initiatives, organisations need visibility. It’s now the bedrock of a successful security programme.

    Join us for ongoing Tech Workshops which are delivered online every two weeks by our knowledgeable sales engineers and include topics for current customers or those learning about Skybox for the first time. Click here to learn more.

    • This promoted content was paid for by the party concerned


    Skybox Skybox Security
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGold: The solution to a $5.3-trillion money-printing problem
    Next Article Interview: BBD executives on getting digital transformation right

    Related Posts

    4 tips for exposure management of your business applications

    19 February 2025

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Company News

    Why parents choose CambriLearn for online education

    19 June 2025

    Disrupt first, ask questions later – the uncomfortable truth about incident response

    18 June 2025

    Sage brings together HR leaders to explore the future of payroll and people management

    18 June 2025
    Opinion

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    AI and the future of ICT distribution

    16 June 2025

    Singapore soared – why can’t we? Lessons South Africa refuses to learn

    13 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.