24x7x365 e360 Client Technical Support: Call (877) 368-4797 opt 9, or

Information technology (IT) and security budgets are tight. Organizations are struggling to keep customers, employees, and shareholders. Imagine that this was the year you were going to upgrade that application or group of devices, as they are no longer supported by the manufacturer. Your budget has disappeared and most everything has been put on hold. However, you still have to protect your customers and employees from an elevated threat of attackers that are using the pandemic to spread malware and steal credentials and data. It may look like all doom and gloom, but there are steps you can take to be proactive in protecting against most attacks aimed at your infrastructure and ways in which adopting principals will provide mitigating controls for audit and compliance.

Micro Segmentation

When it comes to protecting devices from attackers, one of the best lines of defense is preventing access to the device in the first place. Micro segmentation allows for isolation where only devices on the same segment are allowed to talk to each other. When reducing the amount of traffic traversing the network, analysis becomes easier and protection is inherited by belonging to the segment. There are several approaches to micro segmentation, but the most popular forms are host based and network based.

East/West Firewall

Traditional organizations protected internal assets by erecting a barrier between the internet and the internal network. As time went on and attacks became more sophisticated, organizations found themselves victims of attacks that moved laterally through the organization. East/west firewalls help prevent lateral movement by inspecting traffic as it moves inside of the organization vs. north/south to the internet. Both firewall configurations should be considered in todays security architecture, especially in the data center.

Micro Firewall

Most organizations have devices that are unable to have an agent installed on them or have an unsupported operating system that can no longer be patched. Micro firewalls are small devices that sit in front of a system or device and filter ports and protocols. Imagine a medical device that performs a singular task and only communicated on a handful of ports. Why would you leave the device open to any other port than the ones it needs for operation? By limiting the ports and protocols, you are in essence reducing the attack surface of the device.

Treat legacy devices like Internet of Things (IoT) devices

With medical devices and manufacturing devices making up the bulk of devices with unsupported operating, organizations are searching for practical ways to secure them. The reality of the situation is that unsupported devices, in effect, become IoT for the simple reason that they can’t be patched or updated by traditional means. Sure, some of the more progressive IoT technologies are coming out with more secure systems that can be updated, but these make up a small number and don’t address the existing billions of “things”. By leveraging approached like micro segmentation, east/west firewalls, and micro firewalls – you have a path forward in securing unmanaged devices. 

Up your analytics game

As the old adage goes “You can’t manage what you don’t measure”. Reporting and Analytics are key when it comes to managing legacy devices and applications. Behavior-based analytics are important to help understand what a device should be doing and what it is doing. Secondarily, analytics should be able to trigger actions when a device falls out of normal behavior by segmenting it off or removing connectivity to the device completely while investigations happen. They key is to tie analytics, reporting, and actions into a repeatable process that evolves as your attack landscape changes.

Advyz Cyber Risk Services

The main goal of Advyz Cyber Risk Services is to help clients mature their cybersecurity programs. Teaming with leading security providers, we work closely with you to ensure that your organization is prepared and has the tools and technologies in place to help you navigate the right solutions partners. Our team focuses on protecting your data, applications, and infrastructure from the threat of data breaches or other cybersecurity incidents.

Your content goes here.

Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.



Services

Security and Privacy

Creating a strategy for managing risk and compliance, while helping to filter the noise of myriad cybersecurity technologies.

Modern Infrastructure

Empowering your enterprise to achieve its full potentialand greatest efficiencyby keeping IT infrastructure operational, available and secure.

Digital Workplace

Helping businesses keep infrastructure up-to-date, minimizing security risks, and maintaining compliance

Cloud, DevOps & Automation

Accelerating IT service delivery for our clients through the adoption of agile methodologies that are all part of a systems-oriented approach.

Microsoft Expertise

Helping set goals and establishing benchmarks for the journey toward the successful deployment of Microsoft solutions.

Enterprise Managed Services

Design, implementation, licensing optimization, and environmental services, ensuring use of Microsoft's best practices and configurations.

Our Markets and Market Support Vehicles

Business

Professional services and nationally-recognized expertise that align perfectly with the trends and challenges facing a variety of industries.

Healthcare

Recognizing the unique challenges faced by healthcare IT organizations, and offering understanding, capabilities, and trusted relationships.

Public Sector

Helping organizations contain costs maintain high availability while finding new ways to increase security, compliance and more.

Group Purchasing

Industry-leading IT consulting services and technology solutionsaccessed through a streamlined contracting process.

Resources

Events

Learn about our upcoming events and webinars.

Solutions Literature

Access content on solution and service offerings.

Blog

Learn about leading technology topics.

Press Releases

Read official updates from the e360 team.

News Stories

Read about latest industry and  e360 news.

About e360

About e360

Our mission, vision, leadership and team

Accolades

e360 awards and recognition

Privacy

e360's commitment to privacy

Community

e360's commitment to privacy

Careers

e360 career opportunities

Contact

e360 locations and contact resources