Segmentation to Counter Malware

Despite the security products bought from the cybersecurity firms, we cannot prevent the entry of malware. Cloud environment has increased the security breaches. Open source software comes with its own vulnerabilities. Recently this was witnessed in Log4J and OpenSSL. It is difficult to find it in massive enterprise infrastructure.

Hackers need not get into system to infect it. They make clones of the sites you visit, say the bank site. You type in password on this clone site, and the hacker gets it. It is a ‘man in the middle’ kind of attack. There are so many phishing sites.

Many security solutions have been devised. One such solution called segmentation requires a special mention. It is like placing a firewall on all the actions of an app. Mere entry of malware does not start the damage. The ransomware causes the damage when it spreads and locks everything. It collects the data. The first server gets compromised. It does not matter. It may have entered the server with no data. However, from there it spreads and collects all the data. It extra-filtrates.

Segmentation technologies assume zero trust security framework. The dictate is to allow access to authentic and authorised users to data and apps. It facilitates quick identification of malware. The malware gets confined to that segment. Though malware has entered, it cannot do any damage. Segmentation is sine qua non for critical infrastructure in corporates.

print

Leave a Reply

Your email address will not be published. Required fields are marked *